ASR9000/XR NP counters explained for up to XR4.2.1

Document

Aug 20, 2012 7:43 AM
Aug 20th, 2012

 

Introduction

This document builds forward on the ASR9000/XR: Troubleshooting packet drops and understanding NP drop  counters

article and provides explanations for new counters added after the initial document.

 

Core Issue

NP or network processor is the component on ASR9000 linecards that handle the feature processing of packets as they go through the system.

These NP's track the packet with many different counters that are sometimes not very intuitive and this document aims at explaining these counts to give some direction.

 

To understand the packet troubleshooting, refer to the link above.

Resolution

Typhoon counters

 

Display   nameDescription
MDF_TX_LC_CPUTotal (for this NP) of Frames   sent (punted) to linecard CPU, ingress and egress, packets and messages
MDF_TX_WIRETotal (for this NP) of Frames   transmitted from NP to the Ethernet port Traffic Manager. These frames may   still be dropped by the egress Traffic Manager due to egress port congestion.
MDF_TX_WIRE_1(Aggregated to MDF_TX_WIRE)
MDF_TX_WIRE_2(Aggregated to MDF_TX_WIRE)
MDF_TX_WIRE_3(Aggregated to MDF_TX_WIRE)
MDF_TX_FABRICTotal (for this NP) of Frames   sent to the system switch fabric - ingress frames and frames sent into the   switch fabric from the linecard CPU. This includes frames destined for other   LCs, and frames destined for the RSP, and internal messages used for communication   between NPs.
MDF_TX_FABRIC_1(Aggregated to MDF_TX_FABRIC)
MDF_TX_FABRIC_2(Aggregated to MDF_TX_FABRIC)
MDF_TX_FABRIC_3(Aggregated to MDF_TX_FABRIC)
PARSE_INTER_NP_RECEIVE_CNTFrames received from the other   NP of a 100GE port that is serviced by a pair of NPs
PARSE_INTER_NP_RECEIVE_CNT_1(Aggregated to   PARSE_INTER_NP_RECEIVE_CNT)
PARSE_INTER_NP_RECEIVE_CNT_2(Aggregated to   PARSE_INTER_NP_RECEIVE_CNT)
PARSE_INTER_NP_RECEIVE_CNT_3(Aggregated to   PARSE_INTER_NP_RECEIVE_CNT)
PARSE_FAB_RECEIVE_CNTTotal (for this NP) of Frames   received from switch fabric (egress frames)
PARSE_FAB_RECEIVE_1(Aggregated to   PARSE_FAB_RECEIVE_CNT)
PARSE_FAB_RECEIVE_2(Aggregated to   PARSE_FAB_RECEIVE_CNT)
PARSE_FAB_RECEIVE_3(Aggregated to   PARSE_FAB_RECEIVE_CNT)
PARSE_INTR_RECEIVE_CNTInterrupt frames received -   internal NP messages
PARSE_INTR_RECEIVE_1(Aggregated to   PARSE_INTR_RECEIVE_CNT)
PARSE_INTR_RECEIVE_2(Aggregated to   PARSE_INTR_RECEIVE_CNT)
PARSE_INTR_RECEIVE_3(Aggregated to   PARSE_INTR_RECEIVE_CNT)
PARSE_INJ_RECEIVE_CNTTotal (for this NP) of Frames   received by the NP that were injected by RSP or LC CPU - outgoing control   frames
PARSE_INJ_RECEIVE_1(Aggregated to   PARSE_INJ_RECEIVE_CNT)
PARSE_INJ_RECEIVE_2(Aggregated to   PARSE_INJ_RECEIVE_CNT)
PARSE_INJ_RECEIVE_3(Aggregated to   PARSE_INJ_RECEIVE_CNT)
PARSE_ENET_RECEIVE_CNTTotal (for this NP) of Frames   received from Ethernet ports by this NP
PARSE_ENET_RECEIVE_1(Aggregated to   PARSE_ENET_RECEIVE_CNT)
PARSE_ENET_RECEIVE_2(Aggregated to   PARSE_ENET_RECEIVE_CNT)
PARSE_ENET_RECEIVE_3(Aggregated to   PARSE_ENET_RECEIVE_CNT)
PARSE_TM_LOOP_RECEIVE_CNTInternal Loopback frames   received from Traffic Manager - generally used for egress multicast   replication
PARSE_TM_LOOP_RECEIVE_1(Aggregated to   PARSE_TM_LOOP_RECEIVE_CNT)
PARSE_TM_LOOP_RECEIVE_2(Aggregated to   PARSE_TM_LOOP_RECEIVE_CNT)
PARSE_TM_LOOP_RECEIVE_3(Aggregated to   PARSE_TM_LOOP_RECEIVE_CNT)
PARSE_TOP_LOOP_RECEIVE_CNTLoopback frames received from   Pipeline - generally used for packets requiring complex multi-pass processing   in the NP
PARSE_TOP_LOOP_RECEIVE_1(Aggregated to   PARSE_TOP_LOOP_RECEIVE_CNT)
PARSE_TOP_LOOP_RECEIVE_2(Aggregated to   PARSE_TOP_LOOP_RECEIVE_CNT)
PARSE_TOP_LOOP_RECEIVE_3(Aggregated to   PARSE_TOP_LOOP_RECEIVE_CNT)
PARSE_UNKNOWN_DIR_DROPFrames dropped due to input   source unknown - should not occur. Software error.
PARSE_UNKNOWN_DIR_1(Aggregated to   PARSE_UNKNOWN_DIR_DROP)
PARSE_UNKNOWN_DIR_2(Aggregated to   PARSE_UNKNOWN_DIR_DROP)
PARSE_UNKNOWN_DIR_3(Aggregated to   PARSE_UNKNOWN_DIR_DROP)
PARSE_ING_DISCARDTotal (for this NP) of Ingress   frames discarded in Parse phase. Each discard should also have a more   specific counter.
PARSE_EGR_DISCARDTotal (for this NP) of Egress   frames discarded in Parse phase. Each discard should also have a more   specific counter.
DROP_FRM_CRC_ERR_XAUI0Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI0Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI1Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI1Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI2Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI2Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI3Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI3Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI4Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI4Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI5Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI5Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI6Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI6Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI7Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI7Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI8Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI8Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI9Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI9Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_ILKN0Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_ILKN0Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_ILKN1Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_ILKN1Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_ILKN2Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_ILKN2Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_NULL13Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_NULL13Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_NULL14Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_NULL14Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_NULL15Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_NULL15Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII0Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII0Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII1Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII1Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII2Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII2Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII3Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII3Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII4Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII4Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII5Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII5Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII6Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII6Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII7Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII7Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII8Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII8Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII9Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII9Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII10Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII10Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII11Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII11Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII12Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII12Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII13Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII13Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII14Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII14Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII15Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII15Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII16Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII16Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII17Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII17Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII18Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII18Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII19Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII19Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII20Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII20Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII21Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII21Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII22Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII22Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII23Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII23Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII24Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII24Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII25Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII25Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII26Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII26Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII27Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII27Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII28Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII28Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII29Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII29Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII30Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII30Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII31Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII31Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII32Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII32Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII33Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII33Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII34Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII34Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII35Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII35Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII36Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII36Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII37Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII37Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII38Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII38Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII39Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII39Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII40Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII40Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII41Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII41Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII42Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII42Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII43Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII43Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII44Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII44Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII45Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII45Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII46Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII46Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII47Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII47Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_HOST_SGMIIFrames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_HOST_SGMIIFrames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_OTHER_INTFrames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_OTHER_INTFrames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
PARSE_FRM_ERR_CNTdescription not available yet
PRS_CTX_WAIT_TIMEOUTFrames dropped due to Software   error
RSV_CTX_WAIT_TIMEOUTFrames dropped due to Software   error
MDF_CTX_WAIT_TIMEOUTFrames dropped due to Software   error
PRS_HEALTH_MONPeriodic internal heartbeat packet used to monitor the   health of the NP
PRS_HEALTH_MON_DISCARDHealth monitoring packets that   were discarded due to CRC errors. Generally should not occur. May indicate a   buffer management software error.
INTR_FRAME_TYPE_0Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_1Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_2Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_3Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_4Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_5Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_6Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_7Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_8Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_9Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_10Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_11Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_12Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_13Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_14Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_15Interrupt frames - internal NP   messaging
DBG_PRS_EP_L_PRS_PL_PW_DISPOSEIngress packets entering   loopback for PW disposition
DBG_PRS_EP_L_PRS_VPLS_PW_IMPOSEIngress packets entering   loopback for VPLS PW imposition
DBG_PRS_EP_L_PRS_VPLS_DOT1AH_LPIngress packets entering   loopback for VPLS DOT1AH
DBG_PRS_EP_L_PRS_PL_ABFIngress packets entering   loopback for ABF processing
DBG_PRS_EP_L_PRS_PL_L2TP_DECAP_PASS2Ingress packets entering   loopback L2TP decapsulation 2nd pass
DBG_PRS_EP_L_PRS_EGR_L2TPEgress packets entering L2TP   processing
DBG_PRS_EP_L_PRS_PL_L2TP_INGIngress packets entering LAC   imposition pipeline loopback
DBG_PRS_NO_RFD_FOR_PREFETCHAttempts by the NP to allocate a   new NP buffer for some form of internal frames replication, and no buffers   were available. Should only occur rarely under very heavy NP load.
PARSE_ING_INTER_NP_THRU_TRAFFICFrames passed between a pair of   NPs that service a 100GE interface
PARSE_ING_INTER_NP_IPCMessages passed between a pair   of NPs that service a 100GE interface
PARSE_L2_EGR_INJECTL2 egress frames injected by RSP   or LC CPU
PARSE_ING_8023Ingress 802.3 frames received
PARSE_ING_8023_JUMBOIngress 802.3 frames received   with payload greater than 1500 bytes
PARSE_ING_L3_CFMIngress L3 CFM frames
PARSE_ING_L2_CFMIngress L2 CFM frames
PARSE_ING_SLOW_PROTOIngress slow protocol frames   (LACP, SYNCE, EFM)
PARSE_ING_EFM_DISABLEDIngress EFM frames discarded   because EFM is disabled
PARSE_RSP_INJ_L2_PREROUTEInjected L2 pre-routed frames   received by egress NP
PARSE_RSP_INJ_L2_INWARDInjected L2 frames from RSP   received by egress NP
PARSE_RSP_INJ_L2_EGRESSInjected L2 frames received by   egress NP
PARSE_RSP_INJ_FAB_CNTInjected frames received by   egress NP from fabric
PARSE_RSP_INJ_PORT_CNTInjected frames received by   egress NP from inject port
PARSE_RSP_INJ_DIAGS_CNTInternal diagnostics frames   received by NP from RSP
PARSE_EGR_INJ_PKT_TYP_UNKNOWNFrames received from fabric with   unknown packet types (internal error)
PARSE_EGR_INJ_PKT_TYP_IPV4IPv4 packets received from RSP   or LC CPU
PARSE_EGR_INJ_PKT_TYP_IPV6IPv6 packets received from RSP   or LC CPU
PARSE_EGR_INJ_PKT_TYP_MPLSMPLS frames received from RSP or   LC CPU
PARSE_EGR_INJ_PKT_TYP_CLNSOSI CLNS packets received from   RSP or LC CPU
PARSE_EGR_INJ_PKT_TYP_IPV4_PREROUTEPre-routed IPv4 packets received   from RSP or LC CPU
PARSE_EGR_INJ_PKT_TYP_IPV6_PREROUTEPre-routed IPv6 packets received   from RSP or LC CPU
PARSE_LC_INJ_L2_PREROUTEPre-routed L2 frames received   from LC CPU
PARSE_LC_INJ_L2_INWARDInjected L2 frames received from   LC CPU
PARSE_LC_INJ_L2_EGRESSInjected L2 frames received from   LC CPU by egress NP
PARSE_LC_INJ_FAB_CNTFrames received from LC CPU and   passed to fabric
PARSE_LC_INJ_PORT_CNTFrames received from LC CPU
PARSE_LC_INJ_DIAGS_CNTInternal diagnostic frames   received from LC CPU
PARSE_DROP_FAB_UNKNOWN_INJFrames received from RSP of   unknown type (internal error)
PARSE_HOST_INJ_BFD_IPV4_L3_INWARDTransmitted BFD Multihop packet   counters that are injected into the NP from host on which the bfd_session is   hosted.
PARSE_ING_L3_CFM_DROPL3 CFM frames dropped by ingress   NP
PARSE_ING_ISISIS-IS protocol packets received   from Ethernet
PARSE_ING_PIM_IFIBPIM protocol packets detected   and punted via LPTS
PARSE_EGRESS_BFD_PUNT_CNTBFD packets that have reached   the egress LC (on which the bfd session is hosted) and which have been remote   punted from a ingress LC
PARSE_DROP_IN_EFM_BLOCKIngress EFM frames discarded due   to ingress EFM block configured at ingress port
PARSE_DROP_IN_EFM_LOOPBACK_DATAIngress EFM frames looped back   in ingress NP
PARSE_DROP_IN_UIDB_TCAM_MISSFrames dropped due to TCAM miss   at ingress NP
PARSE_DROP_IN_UIDB_NO_ENTRYFrames dropped due to UIDB miss   at ingress NP
PARSE_DROP_IN_ENET_UNKNOWNFrames dropped due to unknown   ethertype at ingress NP
PARSE_DROP_IN_UIDB_DOWNFrames dropped due to   interface/subinterface in shutdown state
PARSE_DROP_INJ_IN_UIDB_NO_MATCHInjected frames dropped due to
PARSE_DROP_IPV4_DISABLEDIPv4 packets dropped on receipt   from Ethernet due to IPv4 not enabled on interface/subinterface
PARSE_DROP_IPV4_MCAST_NOT_ENABLEDIPv4 multicast packets dropped   on receipt from Ethernet due to IPv4 multicast not enabled on   interface/subinterface
PARSE_DROP_IPV4_CHECKSUM_ERRORIPv4 packets dropped on receipt   from Ethernet due to IP header checksum error
PARSE_IPV4_SANITY_ADDR_CHK_FAILURESIPv4 packets dropped on receipt   from Ethernet due to illegal IP addresses
PARSE_DROP_IPV4_LENGTH_ERRORIPv4 packets dropped on receipt   from Ethernet due to IP packet length field inconsistent with L2 frame length
PARSE_DROP_MPLS_DISABLEDMPLS frames dropped on receipt   from Ethernet due to MPLS not enabled on interface/subinterface
PARSE_DROP_ING_MPLS_LABEL_INVALIDMPLS frames dropped on receipt   from Ethernet due to invalid MPLS labeling, such as reserved MPLS label, too   many explicit NULL labels, or EOS not set on last label
PARSE_DROP_ING_MPLS_TTL_ERRORMPLS frames dropped on receipt   from Ethernet due to MPLS time-to-live expiry
PARSE_DROP_EGR_MPLS_LABEL_INVALIDEgress MPLS frames dropped due   to invalid MPLS label (tag value less than 15)
PARSE_L2MC_DROP_ROUTER_GUARDIngress IGMP frames dropped due   to router guard
PARSE_ING_DROP_DHCP_UNTRUSTEDIngress DHCP frames dropped on   untrusted interface
PARSE_EGR_DROP_DHCP_UNTRUSTEDEgress DHCP frames dropped on   untrusted interface
PARSE_L2_MSTP_DROPIngress MSTP frames dropped on   blocked ingress bridge port
PARSE_UNKNOWN_LC_CPU_INJ_DROPUnknown frames received from LC   CPU dropped
PARSE_INJECT_NATIVENative injected frames received   from LC CPU
PARSE_L2_DOT1Q_DROPIngress L2 frames dropped due to   DOT1Q protocol filtering
PARSE_L2_DOT1AD_DROPIngress L2 frames dropped due to   DOT1AD protocol filtering
PARSE_L2_DOT1Q_VTP_DROPIngress L2 frames dropped due to   DOT1Q VTP protocol filtering
PARSE_L2_DOT1AH_ISID_DROPIngress L2 frames dropped due to   DOT1AH invalid ISID
PARSE_DROP_IPV6_DISABLEDIPv6 packets dropped on receipt   from Ethernet due to IPv6 not enabled on interface/subinterface
PARSE_DROP_IPV6_LENGTHIngress or egress frames with   invalid IPv6 header length field (conflicts with L2 length)
PARSE_IPV6_SANITY_ADDR_CHK_FAILURESInvalid ipv6 address that is not   passing the basic sanities (eg rogue address)
PARSE_DROP_IPV6_MCAST_NOT_ENABLEDIPv6 multicast packets dropped   on receipt from Ethernet due to IPv6 multicast not enabled on   interface/subinterface
PARSE_DROP_IPV6_MCAST_NODE_LOCALIPv6 multicast packets dropped   on receipt from Ethernet due to invalid destination address scope
PARSE_EGR_L2_CFMCFM frames received by egress NP
PARSE_L3_TAGGED_PUNT_DROPTagged frames (BPDU, LLDP, UDLD)   received on L3 interface dropped by ingress NP
PARSE_MVRP_UIDB_PUNT_NOT_ENABLEDMVRP frames received with punt   not enabled on the port
PARSE_DOT1AD_UIDB_PUNT_NOT_ENABLEDDOT1AD frames received with punt   not enabled on the port
PARSE_DOT1D_UIDB_PUNT_NOT_ENABLEDDOT1D frames received with punt   not enabled on the port
PARSE_MSTP_DOT1DMSTP DOT1D frames received by   ingress NP
PARSE_MSTP_DOT1ADMSTP DOT1AD frames received by   ingress NP
PARSE_MVRP_DOT1DMVRP DOT1D frames received by   ingress NP
PARSE_MVRP_DOT1ADMVRP DOT1AD frames received by   ingress NP
PARSE_UNKNOWN_NPH_TYPE_DROPEgress frames dropped due to   unknown internal header type (internal error)
GRE_ING_ENCAP_P2_PRSdescription not available yet
GRE_EGR_ENCAP_P2_PRSdescription not available yet
GRE_ING_DECAP_P1_QUAL_NO_MATCHdescription not available yet
GRE_ING_DECAP_P2_PRSdescription not available yet
GRE_ING_DECAP_P2_CHKSUM_RSV1_NONZEROdescription not available yet
GRE_ING_DECAP_P2_GRE_KEY_PRESENT_DROPdescription not available yet
GRE_ING_DECAP_P2_GRE_SEQ_PRESENT_DROPdescription not available yet
GRE_ING_DECAP_P2_GRE_NONZERO_VER_DROPdescription not available yet
GRE_ING_DECAP_P2_GRE_NONZERO_RSVD0_DROPdescription not available yet
GRE_ING_DECAP_P2_PROT_UNSUPPORTEDdescription not available yet
GRE_ING_DECAP_P2_NESTED_GRE_DROPdescription not available yet
GRE_ING_DECAP_P2_CLNS_NO_ISIS_DROPdescription not available yet
GRE_ING_DECAP_P2_FRAGMENTED_GRE_DROPdescription not available yet
GRE_ING_DECAP_P2_NO_UIDB_DROPdescription not available yet
GRE_ING_DECAP_P2_UIDB_DOWNdescription not available yet
GRE_ING_DECAP_P2_KA_PROTO_DOWNdescription not available yet
GRE_ING_DECAP_P2_PUNT_DROPdescription not available yet
LISP_ING_DECAP_P2_PRSdescription not available yet
LISP_ING_DECAP_P2_PROT_UNSUPPORTEDdescription not available yet
CAP_IPV4_PRS_P1description not available yet
CAP_IPV6_PRS_P1description not available yet
CAP_PRS_P2description not available yet
PARSE_VIDMON_PKT_CNTPackets processed for Video   monitoring
VIDMON_SEM_RETRY_TIMEOUTPackets for which Vidmon failed   to acquire a semaphore
PARSE_MOFRR_INTERRUPTInterrupt frames received due to   mcast-only FRR activity or loss monitoring
PARSE_MOFRR_FRR_MSG_RECVInter-NP MoFRR switchover   notifications received
PARSE_IPIW_NON_IP_DROPL2 frames dropped due to non-IP   pacekt received on ipiw interface
PARSE_L2VPN_DEAGG_NON_VPWS_VPLS_DROPL2VPN PW frames dropped on   standby pw
PARSE_ELMIELMI frames received and punted   by ingress NP
PARSE_PVSTPVST frames received by ingress   NP
PARSE_LLDPLLDP frames received by ingress   NP
ELMI_ADDR_TYPE_ERRORELMI frames dropped due to   address type error
UNKNOWN_L2_ON_L3_DISCARDL2 frames with unknown   ether-type received on L3 interface dropped
PARSE_EGRESS_PTP_CNTInjected IPv4 PTP packets   processed by egress NP
PARSE_BFD_NOT_MY_MACBFD packets received but not to   my mac by ingress NP
PARSE_BFD_IPv4_DISABLEDReceived BFD packet and IPV4 not   enabled in L3 ingress ingress interface
PARSE_PPP_KEEPALIVE_HW_REPLYPPPoE+PPP echo request   (keepalive) packets that arrived on a PTA subscriber interface. The NP   generated the reply, instead of punting the packet.
INGRESS_L2TP_LOOKUP_MISSPackets for which, on the   ingress core-facing linecard, there is no entry in the L2TP session table   which matches the packet's tunnel id and session id. These packet are   dropped.
PARSE_INGRESS_L2TP_VRF_NOMATCHNot implemented by ucode
PARSE_INGRESS_L2TP_IP_NOMATCHNot implemented by ucode
L2TP_ING_DECAP_SIP_DROPPackets whose source IP address   does not match the entry in the L2TP session table. These packets are   dropped.
L2TP_ING_DECAP_TID_DROPFrames dropped due to L2TP   tunnel ID miss
L2TP_ING_DECAP_VER_DROPL2TP frames dropped due to   invalid version
PARSE_BFD_UIDB_DOWNReceived BFD packet for which   the ingress interface is down
PARSE_BVI_L3_INGFrames received on BVI L3   interface by ingress NP
PARSE_BVI_L3_EGRFrames to BVI L3 interface by   egress NP
PARSE_BVI_L2_INGFrames received on BVI L2   interface by ingress NP
PARSE_L3_SNF_SETUPdescription not available yet
PARSE_ING_MVPN_PIM_ALL_RTRSIngress GRE-encapped MVPN core   packets recognized as PIM packets destined to all routers. These are punted.
PARSE_UDLDUDLD frames received by ingress   NP
PARSE_SPAN_LPBKSpan frames received after   loopback (2nd pass) by ingress NP
PARSE_P2MP_MPLS_LPBKEgress P2MP/MLDP packets looped   back after replication for MPLS interfaces
PARSE_P2MP_IP_LPBKEgress P2MP/MLDP packets looped   back for IP decap processing
PARSE_P2MP_BUD_NOT_OAMIngress P2MP/MPLS packets   replicated and looped back to check for OAM/PIM packet type. If packet are   not OAM/PIM we drop these replicated copies, otherwise we process them as   needed for OAM/PIM frames.
PARSE_IPMC_GENERIC_ENCAP_FIRST_PASSEgress packets received from   fabric, for MVPN/GRE or MVPN/LSM encapsulation or P2MP, before egress   replication and possible encapsulation
PARSE_IPMC_GENERIC_ENCAP_SECOND_PASS_VRFEgress MVPN head node packets   destined to local VRF receivers, before replication to local receivers
PARSE_IPMC_GENERIC_ENCAP_SECOND_PASS_COREEgress MVPN head node packets to   be encapsulated in LSM or GRE, before replication for a given GRE tunnel or   LSM path
PARSE_MVPN_ENCAP_THIRD_PASSEgress MVPN/GRE head node   packets after encapsulation, before replication for a given GRE tunnel
PARSE_BGP_PA_LPBKPacket that recevies a loopback   (feedback/recirculation) due to the BGP Policy Accounting feature
IN_SATELLITE_DISCOVERY_DISCARDIncoming Satellite Discovery   protocol frames drops because they were received on an interface that is not   configured as a Satellite fabric link
PARSE_EGR_REMOTE_RACK_ENCAP_CNTPackets being prepared for   possible relay over nV inter-cluster link. Note that this often happens in   punt cases regardless of whether clusters are configured.
PARSE_ING_FABRIC_INTERNAL_CNTFrames received at inter rack   link from other rack in cluster
PARSE_MAC_NOTIFY_RCVDInternal notifications received   from other NPs, to learn MAC addresses on a bridge domain
PARSE_MAC_DELETE_RCVDInternal notifications received   from other NPs, to delete MAC addresses from a bridge domain's MAC table
PARSE_REV_MAC_NOTIFY_RCVDReverse MAC Notify packets   received
PARSE_ING_PL_MLDP_PEEK_CNTPipeline copy of MLDP PIM all   routers packet as received by TOPparse
PARSE_UNKNOWN_INTERRUPT_RCVDUnknown NP interrupt message   received
PARSE_DROP_PPPOE_NOT_ENABLEDIngress frames dropped on port   with PPPoE not enabled
PARSE_DROP_PPPOE_DATA_PKT_ON_DOWN_UIDBFrame discards due to a PPPoE   Data packet being received on a PPPoE enabled parent interface when the   subscriber's UIDB protocol status is “down”
PARSE_FAST_DISCARD_CLASSIFIED_DROPFrames discards due to NP   packets-per-second overload. When the NP detects that it is not able to keep   up with the incoming frame rate, and is in danger of dropping frames at the   input FIFO (in an uncontrolled manner), it will attempt to 'catch up' by doing   a fast early discard of all but the highest priority frames, in order to give   priority to protocols and other critical traffic during overload conditions.
PARSE_FAST_DISCARD_UNCLASSIFIED_DROPFrames discards due to NP   packets-per-second overload. When the NP detects that it is not able to keep   up with the incoming frame rate, and is in danger of dropping frames at the   input FIFO (in an uncontrolled manner), it will attempt to 'catch up' by doing   a fast early discard of all but the highest priority frames, in order to give   priority to protocols and other critical traffic during overload conditions.
DBG_RSV_EP_L2_INGRESS_VPWS_AC_TO_PWL2 ingress frames entering VPWS   AC to PW imposition
DBG_RSV_EP_L_RSV_ING_ISIS 
DBG_RSV_EP_L_RSV_ING_L3_IFIBIngress LPTS lookup attempts for   L3 packets
DBG_RSV_EP_L_RSV_ING_L3_IFIB_MATCHL3 packets flagged for punting   due to ingress LPTS lookup match
DBG_RSV_EP_L_RSV_ING_L3_IFIB_PUNT_LOCALL3 packets flagged for punting   to LC CPU
DBG_RSV_EP_L_RSV_ING_L3_IFIB_PUNT_LOCAL1L3 packets flagged for punting   to LC CPU
DBG_RSV_EP_L_RSV_ING_L3_RSLTS_MATCHdescription not available yet
DBG_RSV_EP_L_RSV_ING_PUNTIngress packets punted
DBG_RSV_EP_L_RSV_ING_L2MCIngress L2 multicast packets   punted
DBG_RSV_EP_L_RSV_ING_L2Ingress L2 packets received from   Ethernet
DBG_RSV_EP_L_RSV_EGR_MCSTEgress L2 multicast packets   received from fabric
DBG_RSV_EP_L_RSV_EGR_L2MCEgress L2 multicast packets   received from fabric
DBG_RSV_EP_L_RSV_EGR_FLOODL2 frames received from fabric   to be flooded to bridge domain
DBG_RSV_EP_L_RSV_EGR_MCST_LPBKEgress frames looped back after   multicast replication
DBG_RSV_EP_L_RSV_EGR_IPMC_LPBKEgress IP packets looped back   after multicast replication
DBG_RSV_EP_L_RSV_EGR_L2MC_LPBKEgress L2 frames looped back   after multicast replication (IGMP Snooping)
DBG_RSV_EP_L_RSV_PW_DISPOSEFrames entering PW disposition
DBG_RSV_EP_L_RSV_VPLS_PW_IMPOSEVPLS frames entering PW   imposition
DBG_RSV_EP_L_RSV_DOT1AH_PASS2DOT1AH frames entering 2nd pass   at ingress NP
DBG_RSV_EP_L_RSV_ABF_PASS1Access-List based forwarding   feature PASS
DBG_RSV_EP_L_RSV_ABF_PASS2Access-List based forwarding   feature PASS
DBG_RSV_EP_L_RSV_L2TP_CHECKIngress IP-for-me packets   checked for L2TP protocol
DBG_RSV_EP_L_RSV_L2TP_PASS2Ingress decapsulations of an   IP-for-me L2TP packet
DBG_RSV_EP_L_RSV_L2TP_ING_LAGIngress decapsulations of an   IP-for-me L2TP packet and is sending it to a bundle/LAG interface
DBG_RSV_EP_L_RSV_EGR_L2TPDecapsulations of L2TP packets   on egress
DBG_RSV_EP_L_RSV_ING_MPLS_TPFrames hitting ingress MPLS TP   path
DBG_RSV_ING_LEARN_LOOPMAC addresses learned in ingress   direction
DBG_RSV_EGR_LEARN_LOOPMAC addresses learned in egress   direction
ING_RSV_PW_DHCP_UNTRUSTED_DROPFrames on PW dropped due to a   DHCP untrusted host
RSV_ING_BFDIncoming BFD packet
RSV_DROP_ING_BFDIngress BFD packet was subject   to DROP acount
RSV_DROP_ING_IGMP_IFIBInternal FIB decided to drop the   incoming IGMP packet
RSV_DROP_EGR_UIDB_NO_MATCHEgress packets to be transmitted   on Ethernet
RSV_DROP_EGR_UIDB_DOWNFrames dropped due to egress   UIDB being down
RSV_DROP_IPV4_LEAF_NO_MATCHNo forwarding leaf found for the   prefix routed to
RSV_DROP_IPV6_LEAF_NO_MATCHNo forwarding leaf found for the   prefix routed to
RSV_DROP_IPV4_NRLDI_NO_MATCHNon recursive Load Distribution   index not found
RSV_DROP_IPV6_NRLDI_NO_MATCHNon recursive Load Distribution   index not found
RSV_DROP_MPLS_NRLDI_NO_MATCHNon recursive Load Distribution   index not found
RSV_DROP_IPV4_RXADJ_NO_MATCHInvalid/unfound   receive(/transmit) adjacency
RSV_DROP_IPV6_RXADJ_NO_MATCHInvalid/unfound   receive(/transmit) adjacency
RSV_DROP_MPLS_RXADJ_NO_MATCHInvalid/unfound   receive(/transmit) adjacency
RSV_DROP_IPV4_TXADJ_NO_MATCHInvalid/unfound   receive(/transmit) adjacency
RSV_DROP_IPV6_TXADJ_NO_MATCHInvalid/unfound   receive(/transmit) adjacency
RSV_DROP_MPLS_TXADJ_NO_MATCHInvalid/unfound   receive(/transmit) adjacency
RSV_DROP_IPV4_DROP_NULL_RTEPacket dropped because of a   route to NULL0 interface (bit bucket)
RSV_DROP_IPV6_DROP_NULL_RTEPacket dropped because of a   route to NULL0 interface (bit bucket)
RSV_DROP_MPLS_DROP_NULL_RTEPacket dropped because of a   route to NULL0 interface (bit bucket)
RSV_DROP_IPV4_DROP_RP_DESTdescription not available yet
RSV_DROP_IPV6_DROP_RP_DESTdescription not available yet
RSV_DROP_IPV4_RXADJ_DROPDrop adjacency
RSV_DROP_IPV6_RXADJ_DROPDrop adjacency
RSV_DROP_MPLS_RXADJ_DROPDrop adjacency
RSV_DROP_IPV4_NRLDI_NOT_LOCALdescription not available yet
RSV_DROP_IPV6_NRLDI_NOT_LOCALdescription not available yet
RSV_DROP_MPLS_NRLDI_NOT_LOCALdescription not available yet
RSV_DROP_TE_NH_INCOMPLETEIncomplete Traffic Engineering   next hop adjacency
RSV_DROP_ING_LAG_NO_MATCHFrames dropped due to no LAG   entry found on ingress linecard
RSV_DROP_EGR_LAG_NO_MATCHFrames dropped due to no LAG   entry found on egress linecard
RSV_DROP_UNSUPPORTED_TUNNEL 
RSV_DROP_ACL_DENYIngress or Egress frames dropped   because of a deny action set in the access-list
RSV_DROP_IPV4_TXADJ_DROPDrop adjacency
RSV_DROP_IPV6_TXADJ_DROPDrop adjacency
RSV_DROP_MPLS_TXADJ_DROPDrop adjacency
RSV_DROP_IPV4_URPF_CHKUnicast Reverse path forwarding   failure
RSV_DROP_IPV6_URPF_CHKUnicast Reverse path forwarding   failure
RSV_DROP_L2MC_ING_RTE_DROPIngress L2 multicast frames   dropped due as there is no route match
RSV_DROP_L2MC_EGR_RTE_DROPEgress L2 multicast frames   dropped due as there is no route match
RSV_DROP_L2MC_NO_OLISTEgress L2 multicast frames   dropped due to having no output interfaces on this NP
RSV_DROP_L2MC_NO_UIDB(not used)
RSV_DROP_L2MC_SRCDST(not used)
RSV_DROP_IPM4_ING_RTE_DROPIngress IPv4 multicast packets   dropped due to not matching any mroute
RSV_DROP_IPM4_ING_RTE_DFLAG_DROPIngress IPv4 multicast packets   dropped due to D flag in mroute
RSV_DROP_IPM4_EGR_RTE_DROPEgress IPv4 multicast packets   dropped due to not matching any mroute
RSV_DROP_IPM4_EGR_TTL_DROPEgress IPv4 multicast packets   dropped due to IP header time-to-live expiry
RSV_DROP_IPM4_EGR_FILTER_DROPEgress IPv4 multicast packets   dropped rather than transmitting back on source port
RSV_DROP_IPM4_EGR_RPF_FAIL_DROPEgress IPv4 multicast packets   dropped due to Reverse Path Forwarding check failure
RSV_DROP_IPM4_NO_OLISTEgress IPv4 multicast packets   dropped due to not having any egress ports on this NP
RSV_DROP_IPM4_NO_UIDBEgress IPv4 multicast packets   dropped due to egress interface lookup failure
RSV_DROP_IPM4_MVPN_RTE_NOT_MASTEREgress IPv4 multicast packets   that would be punted for signalling but are dropped due to not being on the   master LC/NP
RSV_DROP_IPM4_MVPN_RPF_NOT_MASTEREgress IPv4 multicast packets   that would be punted for Reverse Path Forwarding check failure but are   dropped due to not being on the master LC/NP
RSV_DROP_IPM4_MVPN_DECAP_NO_MATCHEgress MVPN packets to be   decapsulated but dropped due to MVPN decap table lookup failure
RSV_DROP_IPM4_ING_ENCAP_INVALIDIngress MVPN/P2MP packets   dropped due to invalid encap table entry
RSV_DROP_IPM4_EGR_ENCAP_NO_MATCHEgress MVPN/P2MP packets dropped   due to encap entry lookup failure
RSV_DROP_IPM4_EGR_ENCAP_INVALIDEgress MVPN/P2MP packets dropped   due to invalid encap table entry
RSV_DROP_IPM4_ENCAP_LEAF_NO_MATCHEgress MVPN Generic Encap 2nd   pass packets dropped due to encap output list entry (tunnel entry) lookup   failure
RSV_DROP_IPM4_ENCAP_LEAF_INVALIDEgress MVPN Generic Encap 2nd   pass packets dropped due to invalid encap output list entry
RSV_DROP_IPM4_MVPN_MTUEgress MVPN packets to be   encapsulated but dropped due to exceeding tunnel MTU
RSV_DROP_IPM4_NO_ENCAP_OLISTEgress MVPN encap packets with   no encapsulation output list entries
RSV_DROP_IPM6_ING_RTE_DROPIngress IPv6 multicast packets   dropped due to not matching any mroute
RSV_DROP_IPM6_ING_RTE_DFLAG_DROPIngress IPv6 multicast packets   dropped due to D flag in mroute
RSV_DROP_IPM6_EGR_RTE_DROPEgress IPv6 multicast packets   dropped due to not matching any mroute
RSV_DROP_IPM6_EGR_TTL_DROPEgress IPv6 multicast packets   dropped due to IP header time-to-live expiry
RSV_DROP_IPM6_EGR_FILTER_DROPEgress IPv6 multicast packets   dropped rather than transmitting back on source port
RSV_DROP_IPM6_EGR_RPF_FAIL_DROPEgress IPv6 multicast packets   dropped due to Reverse Path Forwarding check failure
RSV_DROP_IPM6_NO_OLISTEgress IPv6 multicast packets   dropped due to not having any egress ports on this NP
RSV_DROP_IPM6_NO_UIDBEgress IPv6 multicast packets   dropped due to egress interface lookup failure
RSV_DROP_IPM6_MVPN_MDT_MTUEgress IPv6 MVPN packets to be   encapsulated but dropped due to exceeding tunnel MTU
RSV_DROP_IPM6_MVPN_RTE_NOT_MASTEREgress IPv6 multicast packets   that would be punted for Reverse Path Forwarding check failure but are   dropped due to not being on the master LC/NP
RSV_DROP_IPM6_MVPN_RPF_NOT_MASTEREgress IPv6 multicast packets   that would be punted for Reverse Path Forwarding check failure but are   dropped due to not being on the master LC/NP
RSV_DROP_MLDP_MDT_MTUEgress MLDP multicast packets to   be encapsulated but dropped due to exceeding tunnel MTU
RSV_DROP_MLDP_ING_NRLDI_NO_MATCHIngress MLDP NRLDI lookup failed   for the incoming label
RSV_DROP_MLDP_ING_NRLDI_INVALIDIngress MLDP packets for which   bud or tail flag is set on the label result but NRLDI type is not MLDP
RSV_DROP_MC_FLD_IGNORE_IRLEgress multicast or flooded   packets that are dropped rather than forwarded over nV cluster IRL because   another path would forward the packet to the remote rack
RSV_DROP_MPLS_LEAF_NO_MATCH 
RSV_DROP_ING_MPLS_PLUPacket forwarded over unknown   label
RSV_DROP_EGR_MPLS_PLUPacket forwarded over unknown   label
RSV_DROP_XID_NO_MATCHFrames dropped due to no XID   entry found for VPWS or MPLS
RSV_DROP_DXID_NO_MATCH_OR_UNBOUNDFrames dropped due to no XID   entry found on egress VPLS
RSV_DROP_L2VPNLDI_NO_MATCHFrames dropped due to no L2VPN   LDI found on ingress
RSV_DROP_MPLS_CSC_CHK_FAILCarrier supporting carrier mpls   label failure
RSV_DROP_BD_MEMBER_TYPE_NO_MATCHFrames dropped due to no match   for bridge domain member
RSV_DROP_BD_MEMBER_TYPE_NO_MEMBERFrames dropped due to bridge   domain member not active
RSV_DROP_IFIB_TTL_CHECKVerification of TTL in the ifib   processing (internal fib)
RSV_DROP_MPLS_TTL_EXPIREDTTL of the incoming packet   expired
RSV_DROP_MPLS_MTU_EXCEEDEDPacket is larger then the MPLS   MTU of the egress interface and therefore is dropped
RSV_DROP_PIT_MISSdescription not available yet
RSV_DROP_PRRT_UIDB_MISSdescription not available yet
RSV_DROP_IN_L3_NOT_MYMACdestination mac address is not   mine of the interfae it was received on
RSV_PUNT_PIT_MISSdescription not available yet
RSV_PUNT_IP_MTU_EXCEEDEDEgress IP packets punted due to   exceeding the interface MTU. IPv4 frames are punted to be fragmented; IPv6   frames are punted to be dropped, generating ICMP messages.
RSV_PUNT_8023_MTU_EXCEEDEDFrames punted due to MTU   exceeded
RSV_ING_PUNT_AND_FWDIngress frames that are both   forwarded to fabric and punted
RSV_EGR_PUNT_AND_FWDEgress frames that are both   forwarded to fabric and punted
RSV_ING_L2_SMAC_MISSFrames received with an unknown   source MAC
RSV_ING_L2_BD_FLUSHMAC   Entries deleted due to Bridge Domain flushMAC Entries deleted due to   Bridge Domain flush
RSV_ING_L2_PORT_FLUSHMAC   Entries deleted due to port flushMAC Entries deleted due to port   flush
RSV_ING_L2_LEARNMAC   Addresses learned on ingressMAC Addresses learned on ingress
RSV_ING_L2_MOVEMAC   Addresses that have moved locationsMAC Addresses that have moved   locations
RSV_ING_L2_FLUSHFlushed MAC addresses
RSV_ING_L2_NG_SKIP_LEARNMAC   Address egress learn attempts that have timed outMAC Address egress learn   attempts that have timed out
RSV_NO_RFD_DROPFrames dropped due to lack of   RFD buffers
RSV_ING_L2_FLOOD_BLOCKFrames dropped due to floods   being blocked on an interface
RSV_EGR_L2_DROP_FLOOD_NO_MEMBERFrames dropped due to no bridge   members on the NP
RSV_EGR_L2_FLOOD_BD_MISSFrames dropped due to no bridge   domain
RSV_ING_L2_VPLS_MAC_FILTERFrames dropped due to MAC   filtering
RSV_ING_L2_SRC_XID_MISSFrames dropped due to source XID   not found
RSV_ING_L2_SRC_XID_UNBOUNDFrames dropped due to source XID   unbound state
RSV_EGR_L2_DEST_XID_UNBOUNDFrames dropped due to   destination XID unbound state
RSV_ING_VPLS_ERR_DROPFrames dropped due to   fallthrough of normal path VPLS ingress
RSV_ING_VPWS_ERR_DROPFrames dropped due to DXID or   LAG not found on VPWS ingress
RSV_ING_L2_BD_MISSFrames dropped due to bridge   domain structure miss
RSV_ING_L2_REFLECT_FILTERFrames dropped to avoid   forwarding a flood back out the source port on ingress
RSV_EGR_L2_REFLECT_FILTERFrames dropped to avoid   forwarding a flood back out the source port on egress
RSV_EGR_L2_NOT_MEMBERFrames dropped due to bridge   member not found for multicast
RSV_EGR_L2_INACTIVE_MEMBERFrames dropped due to bridge   member inactive for multicast
RSV_EGR_L2_NG_SKIP_LEARNMAC   Address egress learn attempts that have timed outMAC Address egress learn   attempts that have timed out
RSV_L2_SHG_DROPFrames dropped due to split   horizon
RSV_L2_MSTP_DROPFrames dropped due to MSTP   blocking state
RSV_VPLS_LEARN_LIMIT_ACTION_DROP_CNTFrames dropped due to bridge   learn limit
RSV_VPLS_MCAST_SRC_MAC_DROP_CNTFrames dropped due to multicast   source MAC
RSV_VPLS_SECURE_MAC_DROP_CNTFrames dropped due to secure MAC
RSV_VPLS_SECURE_MAC_NOTIFY_CNTSecure MAC notify events
RSV_VPLS_DAI_VIOLATION_DROP_CNTFrames dropped due to DAI   violation
RSV_VPLS_DAI_NOTIFY_CNTDAI notify events
RSV_VPLS_IPSG_VIOLATION_DROP_CNTFrames dropped due to IPSG   violation
RSV_VPLS_IPSG_NOTIFY_CNTIPSG notify events
RSV_VPLS_EGR_MAC_MOVE_DENIED_CNTFrames dropped due to egress MAC   move denial
RSV_VPLS_MAC_MOVE_CNTMAC   movesMAC moves
RSV_VPLS_STATIC_MAC_MOVE_DROP_CNTFrames dropped because static   MACs cannot move
RSV_LEARN_FROM_NOTIFY_CNTMAC   learns from a MAC notifyCount of mac learn notifications   that result in newly learned macs.
RSV_VPLS_MAC_NOTIFY_ERR_DROP_CNTCount of mac learn notifications   that can't be processed by the NP due to an error. Bridge domain lookup miss,   mac entry is already there and static, or xid lookup miss and xid is global.
RSV_VPLS_MAC_DELETE_ERR_DROP_CNTCount of mac delete   notifications that can't be process by the NP due to an error. See above.
RSV_VPLS_MAC_DELETE_SECURE_DROP_CNTCount of mac delete   notifications that can't be processed by the NP due to the entry having mac   secure settings.
RSV_REFRESH_FROM_NOTIFY_CNTCount of mac learn notifications   that result in the mac entry being refreshed. This updates the timestamp so   that entry won't be aged out. For mac addresses that are actively being   forwarded.
RSV_MOVE_FROM_NOTIFY_CNTCount of mac learn notifications   that result in the mac entry being moved to a different interface (XID).
RSV_DELETE_FROM_MSG_CNTCount of mac delete   notifications that result in the mac entry being deleted.
RSV_ING_LEARN_ONLY_DROP_CNTCount of vpls frames that are   dropped due to the bridge being in learn only state. In this state, source   mac addresses are learned by not forwarded.
RSV_EGR_EFP_FILTER_TCAM_MISS_DROP_CNTCount of vpls frames that are   dropped by EFP filtering due to the vlan encapsulation on the wire not   matching any transmit interface. Can only increment if EFP filtering is   enabled.
RSV_EGR_EFP_FILTER_MISS_DROP_CNTCount of vpls frames that are   dropped by EFP filtering due to the vlan encapsulation on the wire not   matching the interface that the frame is transmitted on. Can only increment   if EFP filtering is enabled.
RSV_EGR_PREFILTER_VLAN_DROP_CNTCount of vpls frames that are   dropped by EFP filtering due to the vlan encapsulation on the fabric not   matching the interface that the frame is transmitted on. Can only increment   if EFP filtering is enabled. Can only increment if EFP filtering is enabled.
RSV_EGR_VLAN_NUM_DROP_CNTCount of vpls frames that are   dropped due to the vlan encapsulation on the fabric not having enough tags to   support the egress vlan ops. This prevents the ucode from corrupting the   frame if vlan tags are popped on egress.
RSV_ING_L2_VPLS_STORM_DROP_CNTTotal number of flood frame   drops due to vpls storm control. These are broadcast, multicast, or unknown   unicast. Only valid if vlps storm control is enabled.
RSV_ING_L2_DOT1AH_ISID_DROP_CNTTotal dot1ah vpls frame drops   due to dot1ah isid lookup miss when the provider destination mac that matches   the my-backbone-mac of the box.
RSV_ING_L2_DOT1AH_CORE_LOOP_DROP_CNTTotal dot1ah vpls frame drops   due to a provider source mac that is already programmed as the   my-backbone-mac of the box. Indicates a loop on the core side of the dot1ah   connection.
VIDMON_TCAM_LKUP_MISS_CNTVidmon policy lookup was done   and it was not successful
VIDMON_INTF_HASH_LKUP_MISS_CNTVidmon interface hash lookup was   done and it was not successful
VIDMON_RSV_FLOW_ADD_CNTVidmon flows learned
VIDMON_RSV_FLOW_UPDATE_CNTVidmon flows updated
VIDMON_FLOW_DEL_CNTVidmon flows deleted
VIDMON_FLOW_LIMIT_EXCD_CNTVidmon flows attempted to be   added but the NP is already at the limit
VIDMON_IDX_Q_EMPTY_CNTVidmon flows attempted to be   added but the NP is already at the limit
VIDMON_NG_LEARN_CNTVidmon add operations attempted   but the NP is too busy
RSV_EGR_LAG_NOT_LOCAL_DROP_CNTPacket to be forwarded over a   bundle member is not local to this NP (it means that the hash selector is not   producing the member that resides on this NP)
RSV_EGR_PW_DHCP_UNTRUSTED_DROPFrames on PW dropped due to a   DHCP untrusted host
RSV_MOFRR_INGIngress IPv4 packets received on   MoFRR mroutes
RSV_MOFRR_WD_UPDATEIngress IPv4 packets received on   MoFRR mroute from interface for which traffic is being passed, incrementing   watchdog
RSV_MOFRR_ACT_PUNTMoFRR activity watchdog   interrupt notifications received, which are then punted
RSV_MOFRR_LOSS_MSGMoFRR loss watchdog interrupt   notifications received
RSV_MOFRR_INTR_CNTMoFRR watchdog interrupt   notifications received
RSV_MOFRR_HRT_LKUP_FAIL_DROP_CNTMoFRR watchdog interrupt   notifications ignored due to watchdog entry lookup failure
RSV_MOFRR_WDT_INVALID_RES_DROP_CNTMoFRR watchdog interrupt   notifications ignored due to watchdog entry being in an invalid state   (monitoring neither activity nor loss)
RSV_MOFRR_SKIP_LRN_CNTFailed attempts to record an   MoFRR switchover, due to learn timeout
RSV_MOFRR_HRT_UPDATE_CNTMoFRR switchovers recorded
RSV_MOFRR_SEQ_NUM_FAIL_DROP_CNTMoFRR switchover notifications   ignored due to sequence number mismatch
RSV_MOFRR_SWITCH_IGNORED_CNTMoFRR switchover message heeded   but not punted because of RPF mismatch
RSV_ABF_NON_DEFAULT_RTE 
RSV_L2TP_ING_STR_MISS_DROP_CNTWhile processing a packet from a   PPPoE LAC subscriber, the ingress linecard unexpectedly did not find an entry   in the L2TP session table
RSV_L2TP_BAD_TUNNEL_ROUTE_DROP_CNTWhile processing a packet from a   PPPoE LAC subscriber, the ingress linecard unexpectedly could not route the   encapsulated packet to the LNS. The packet was about to be punted, dropped,   or routed into a GRE tunnel.
RSV_L2BC_BVICount of flooded broadcast or   multicast vpls frames that are sent to the BVI. Only increments if the BVI   interface is part of the VPLS flood group.
RSV_L2MC_BVICount of layer2 multicast routed   frames that are sent to the BVI. Only increments if the BVI interface is part   of the multicast group.
RSV_EGR_SPANCount of egress span frames   replciated by resolve.
UTURNCHECK_FRR_DROPdescription not available yet
ERP_ING_PUNTdescription not available yet
RSV_SNF_SAMPLE_PROCESSdescription not available yet
RSV_SNF_SAMPLE_PKTdescription not available yet
RSV_SNF_IPV4description not available yet
RSV_SNF_ING_PUNTdescription not available yet
RSV_SNF_EGR_PUNTdescription not available yet
RSV_MVPN_ENCAPdescription not available yet
RSV_P2MP_EGR_SEND_IP_PLEgress P2MP/MLDP packets being   replicated and prepped to loop back for IP decap processing
RSV_P2MP_EGR_SEND_TAIL_PLIngress P2MP/MLDP packets being   prepped to loop back for Tail IP decap processing
RSV_P2MP_EGR_SEND_BUD_PLIngress P2MP/MLDP packets being   replicated and prepped to loop back for other checks like OAM/PIM.
RSV_P2MP_NO_MPLS_OLEEgress P2MP/MLDP packets being   dropped as there are no MPLS interfaces on this NP for this tunnel, we still   continue to do IP decap as needed.
RSV_BGP_PA_EGR_SAPolicy Accounting (BGP)
RSV_BGP_PA_EGR_SA_DROPPolicy Accounting (BGP)
RESOLVE_INV_REMOTE_RACK_UIDB_DROP_CNTFrames destined to nV cluster   inter-rack link dropped due to egress UIDB lookup failure - software error
RESOLVE_REMOTE_RACK_PREP_CNTFrames prepared to be forwarded   on nV cluster inter-rack link. Note that punted frames are often prepared   this way even if clusters are not configured.
RESOLVE_EGR_REMOTE_RACK_ENCAP_CNTEgress frames encapsulated for   transmission on nV cluster inter-rack link
RESOLVE_ING_REMOTE_RACK_DECAP_CNTFrames received on nV cluster   inter-rack link, decapsulated, and forwarded to fabric
RSV_SEND_MAC_NOTIFY_TO_IRLMAC Notify internal messages   forwarded over nV inter-rack link
RSV_MAC_ACC_SA_MISSMac Accounting frame SMAC no   match
RSV_MAC_ACC_DA_MISSMac Accounting frame DMAC no   match
RSV_NO_REMOTE_RACK_PORTSEgress L2 flooded or multicast   packets that are dropped rather than forwarded over nV cluster inter-rack   link because the BD or mcast group has no receivers on the remote rack
RSV_GET_CTX_TMOUT_EFP_FILTERFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_IFIB_RSLTSFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_IFIB_RSLTS_GREFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_IFIB_RSLTS_LISPFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_ING_UIDB_EXTFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_QOS_CTXFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_ACL_CTXFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_PARENT_QOS_CTXFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_PARENT_QOS_IF_CTXFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_PARENT_QOS_LPBK_CTXFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_TM_PART2_CTXFrames dropped due to Internal   context timeout - software error
RSV_EGR_CLUSTER_SH_DROP_CNTPacket dropped due to Cluster   Split Horizon Check.
RSV_MLDP_ING_PEEK_PLMLDP packets with the inner IP   packet destined to the PIM all routers address. These packets are replicated   and one copy is sent to pipeline loopback for further processing.
RSV_DBA_FLOW_ADDdescription not available yet
RSV_DBA_FLOW_DELdescription not available yet
RSV_DBA_LEARN_LIMIT_REACHEDdescription not available yet
DBA_LRN_SCAN_MSG_CNTdescription not available yet
DBA_LRN_FLOW_ADD_REQdescription not available yet
DBA_LRN_FLOW_ADD_CNTdescription not available yet
DBA_LRN_IDX_Q_EMPTY_CNTdescription not available yet
DBA_LRN_ADD_ABORT_CNTdescription not available yet
DBA_LRN_ADD_WAIT_4_IDX_Q_CNTdescription not available yet
DBA_LRN_ADD_FAIL_CNTdescription not available yet
DBA_LRN_FLOW_DEL_REQdescription not available yet
DBA_LRN_FLOW_DEL_CNTdescription not available yet
DBA_LRN_FLOW_DEL_FAIL_CNTdescription not available yet
DBA_LRN_MSG_Q_FULL_CNTdescription not available yet
RSV_MLDP_ING_DROPIngress MLDP packets dropped due   to the ingress drop flag set on the local label; used for Make-Before-Break
RSV_MLDP_EGR_DROPEgress MLDP packets dropped due   the the egress drop flag set on the local label; used for Make-Before-Break
RSV_DBA_FLOW_DEL_dropdescription not available yet
RSV_DBA_NG_LEARN_CNTdescription not available yet
MDF_PIPE_LPBKdescription not available yet
MDF_PIPE_LPBK_EXCEPTION_DROPdescription not available yet
MDF_PIPE_LPBK_BUFFER_PREFETCHdescription not available yet
MDF_DROP_RPF_FAILIP multicast frames that failed   reverse-path-forwarding check, but not punted due to NPRF (RPF punt table)   result
MDF_MOFRR_SWITCH_IGNOREDMoFRR switchover message heeded   but not punted because NP ID mismatch. Only the NP that sends the message   punts it. Note that this value should be subtracted from the MOFRR_PUNT   counter, which is incremented prior to this test.
MDF_MOFRR_LOSS_PUNTMoFRR switchover messages punted   to LC CPU for signalling
MDF_PUNT_POLICE_DROPFrames dropped rather than   punted due to punt policing. There should be a more specific _EXCD counter   incremented, for the punt reason code.
MDF_DROP_PUNT_REASON_NO_MATCHFrames dropped rather than   punted due to invalid punt reason code
MDF_DROP_EGR_PORT_NO_MATCH 
MDF_DROP_RACK_NO_MATCHFrame dropped as Cluster Rack   table info not found
MDF_DROP_EGR_MN_PORT_NO_MATCHCount of mac notifies that are   skipped due to egress port table lookup miss. Indicates a programming error.
MODIFY_SPAN_MISS_DROPCount of span frames that are   not transmitted due to a span table lookup miss.Includes ingress and egress   span.
MDF_PUNT_RSP_VIA_HOST_PORTdescription not available yet
MODIFY_PUNT_REASON_MISS_DROPdescription not available yet
BFD_NEIGHBORdescription not available yet
BFD_NEIGHBOR_DROPdescription not available yet
BFD_LOOPdescription not available yet
BFD_LOOP_DROPdescription not available yet
BFD_MULTIHOPdescription not available yet
BFD_MULTIHOP_DROPdescription not available yet
BFD_IPv6_NEIGHBORdescription not available yet
BFD_IPv6_NEIGHBOR_DROPdescription not available yet
BFD_IPv6_LOOPdescription not available yet
BFD_IPv6_LOOP_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_0description not available yet
BFD_REMOTE_PUNT_DISC_0_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_1description not available yet
BFD_REMOTE_PUNT_DISC_1_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_2description not available yet
BFD_REMOTE_PUNT_DISC_2_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_3description not available yet
BFD_REMOTE_PUNT_DISC_3_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_4description not available yet
BFD_REMOTE_PUNT_DISC_4_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_5description not available yet
BFD_REMOTE_PUNT_DISC_5_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_6description not available yet
BFD_REMOTE_PUNT_DISC_6_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_7description not available yet
BFD_REMOTE_PUNT_DISC_7_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_8description not available yet
BFD_REMOTE_PUNT_DISC_8_DROPdescription not available yet
MODIFY_BFD_TABLE_LOOP_ERRORdescription not available yet
MODIFY_BFD_TABLE_INDEX_ERRORdescription not available yet
MODIFY_BFD_TABLE_ENTRY_ERRORdescription not available yet
MODIFY_PUNT_NF_MSGdescription not available yet
MODIFY_PUNT_NF_IPV4description not available yet
MODIFY_SEND_TO_INTER_RACK_NP_CNTIngress frames being sent to   inter-rack NP for forwarding to another rack in the nV cluster
MODIFY_NF_PUNT_RFD_PREFETCH_FAILdescription not available yet
MODIFY_SIM_ONLY_WRED_MATCH_CNTShould be unused. May indicate a   software error in which a feature counter pointer is not counting properly.
MODIFY_SIM_ONLY_Q_PRIShould be unused. May indicate a   software error in which a feature counter pointer is not counting properly.
DBG_LRN_EP_L_ON_DEMANDON-DEMAND MAC learning in Flush   and Scan modes
DBG_LRN_EP_L_BD_FL_TYPDeleted entries with BD_ID   matching pattern in Mask Register
DBG_LRN_EP_L_XID_FL_TYPDeleted or showed entries with   XID matching pattern in Mask Reg
DBG_LRN_EP_L_BD_GRP_XID_TYPDeleted entries within BD that   have XID LearnKey mismatch
DBG_LRN_EP_L_BD_GRP_ALL_TYPDeleted entries within BD that   have XID or BD LearnKey mismatch
DBG_LRN_EP_L_GRP_XID_LOCAL_FL_TYPDeleted local XID entries with   XID Learn Key mismatch
DBG_LRN_EP_L_GRP_XID_GLOBAL_FL_TYPDeleted global XID entries with   XID Learn Key mismatch
DBG_LRN_EP_L_GRP_XID_ALL_FL_TYPDeleted entries with XID Learn   Key mismatch
DBG_LRN_EP_L_GRP_BD_FL_TYPDeleted entries with BD Learn   Key mismatch
DBG_LRN_EP_L_GRP_ALL_FL_TYPDeleted entries with BD or XID   Learn Key mismatch, or showed all entries that have matching LearnKey
DBG_LRN_REFRESH_ABORT_CNTAbort refresh due to queue full
DBG_LRN_MAC_CACHE_QUEUE_FULL_CNTNumber of times Scan message   needed to wait for room on the queue
DBG_LRN_DEL_MSG_QUEUE_FULL_CNTNumber of times checking whether   the message queue is full
LRN_INVALID_ON_DEMAND_FILTER_TYPECount of unknown on-demand flush   request types. Indicates a corrupted flush request message from the host, or   a software error
LRN_ON_DEMAND_FLUSH_DELETE_ENTRYNumber of mac entries deleted by   all on-demand flush requests from the host.
LRN_PERIODIC_AGING_DELETE_ENTRYNumber of mac entries deleted by   the aging scan machine due to aging out, or due to a learn key mismatch   detected.
LRN_LEARN_REQUEST_DELETE_ENTRYNumber of mac deletes processed   by the learn engine - in response to a request from resolve - does not   include aging or on-demend flush deletes. Usually is due to a delete frame   received by the egress np from the fabric.
LRN_L2FIB_MAC_TBL_FULLCounts of missed learns due to   mac hash table full. Only possible at high scale
VIDMON_LRN_ADD_ABORT_CNTVidmon flow learn operations   aborted
VIDMON_LRN_ADD_FAIL_CNTVidmon flow learn operations   that failed
VIDMON_LRN_ADD_WAIT_4_IDXQL_CNTWaits for resources before   adding a vidmon flow
VIRTUAL_IF_LAYER2_UCAST_INPUT_CNTIngress unicast frames for   virtual interface such as BVI, MIRP inject, SPAN loopback
VIRTUAL_IF_LAYER2_MCAST_INPUT_CNTIngress multicast frames for   virtual interface such as BVI, MIRP inject, SPAN loopback
VIRTUAL_IF_LAYER2_BCAST_INPUT_CNTIngress broadcast frames for   virtual interface such as BVI, MIRP inject, SPAN loopback
VIRTUAL_IF_PROTO_IPV4_UCST_INPUT_CNTdescription not available yet
VIRTUAL_IF_PROTO_IPV4_MCST_INPUT_CNTdescription not available yet
VIRTUAL_IF_PROTO_MPLS_INPUT_CNTdescription not available yet
VIRTUAL_IF_GENERIC_INPUT_DROPdescription not available yet
VIRTUAL_IF_PROTO_IPV6_UCST_INPUT_CNTdescription not available yet
VIRTUAL_IF_PROTO_IPV6_MCST_INPUT_CNTdescription not available yet
VIRTUAL_IF_LAYER2_BCAST_EXCD_DROP_CNTVPLS broadcast frames dropped   due to storm control, instead of flooded. Only valid when vpls storm control   is enabled.
VIRTUAL_IF_LAYER2_MCAST_EXCD_DROP_CNTVPLS multicast frames dropped   due to storm control, instead of flooded. Only valid when vpls storm control   is enabled.
VIRTUAL_IF_LAYER2_UNK_UCAST_EXCD_DROP_CNTVPLS unknown unicast frames   dropped due to storm control, instead of flooded. Only valid when vpls storm   control is enabled.
VIRTUAL_IF_GENERIC_UNK_PROT_DROP_CNTDrops of unknown protocol frames   detected on L3 interface; these are dropped instead of punted.
PUNT_INVALIDInvalid Punt Reason - this   should not occur
PUNT_INVALID_DROPInvalid Punt Reason - this   should not occur
PUNT_ALLPunt All Set - not implemented   by ucode
PUNT_ALL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CDPPunt Ingress CDP protocol frames   - layer3 interface only
CDP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
ARPPunt Ingress ARP protocol frames   - layer3 interface only
ARP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
RARPPunt Ingress Reverse ARP   protocol frames - layer3 interface only
RARP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CGMPPunt Ingress CGMP protocol   frames - layer3 interface only
CGMP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
LOOPPunt Ingress ELOOP protocol   frames - layer3 interface only
LOOP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
SAP_PUNTNot implemented by ucode
SAP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
BUNDLE_PROTO_PUNTNot implemented by ucode
BUNDLE_PROTO_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
UNKNOWN_OSINot implemented by ucode
UNKNOWN_OSI_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DIAGSNot implemented by ucode
DIAGS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
SNIFFNot implemented by ucode
SNIFF_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_GLOBAL_IFHANDLE_TCAM_MISSInterface handle lookup in TCAM   didn't result anything useful. (usually a sw bug)
PUNT_GLOBAL_IFHANDLE_TCAM_MISS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DROP_PACKETNot implemented by ucode
DROP_PACKET_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CFM_OTHERIngress NP Punt or Egress NP   Punt of CFM other packets (link trace or perf. mon.). Ingress punts can occur   on a Layer2 or Layer3 interface Egress punts occur on a Layer2 interface   only.
CFM_OTHER_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CFM_OTHER_RSP_PUNT 
CFM_OTHER_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DHCP_SNOOP_REQIngress Punt of DHCP snoop   request frames - layer2 interface only and DHCP snooping enabled
DHCP_SNOOP_REQ_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DHCP_SNOOP_REPLYIngress Punt of DHCP snoop reply   frames - layer2 interface only and DHCP snooping enabled
DHCP_SNOOP_REPLY_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTPIngress NP Punt or Egress NP   Punt of MSTP frames. For Layer2 VPLS or Layer3, punt is on ingress frames   only. For Layer3 VPWS, punt is on egress frames only.
MSTP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTP_PBIngress NP Punt or Egress NP   Punt of MSTP Provider Bridge frames. For Layer2 VPLS or Layer3, punt is on   ingress frames only. For Layer3 VPWS, punt is on egress frames only.
MSTP_PB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DAINot implemented by ucode
DAI_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IGMP_SNOOPIngress punt of snooped IGMP or   PIM frames - layer2 interface only and IGMP snooping enabled
IGMP_SNOOP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPSUBNot implemented by ucode
IPSUB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PPPOENot implemented by ucode
PPPOE_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PPPNot implemented by ucode
PPP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
EFMIngress Punt of EFM Protocol   frames - layer3 interface only
EFM_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPv4_OPTIONSIngress Punt of IP frames with   options - layer3 interface only - IPV4, IPV6
IPv4_OPTIONS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_PLU_PUNTIngress or Egress punt of IPV4   frames with punt flag set in Leaf results or R-LDI results - layer3 interface   only
IPV4_PLU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4MC_DO_ALLIPV4 Mcast frames punted and not   not forwarded. (The punt code is best interpreted as instructions to the LC   CPU receiving the packet.)
IPV4MC_DO_ALL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4MC_DO_ALL_BUT_FWDIPV4 Mcast frames punted and   forwarded. (The punt code is best interpreted as instructions to the LC CPU   receiving the packet.)
IPV4MC_DO_ALL_BUT_FWD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_DOUBLE_TUNNELNot implemented by ucode
IPV4_DOUBLE_TUNNEL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NO_MATCHIngress or Egress IPV4 IPV6   unicast frames punted due to ICMP Unreachable (i.e., next hop down)
PUNT_NO_MATCH_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_TUNNEL_FORUSNot implemented by ucode
IPV4_TUNNEL_FORUS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_FRAG_TUNNELNot implemented by ucode
IPV4_FRAG_TUNNEL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_CANNOT_FRAGNot implemented by ucode
IPV4_CANNOT_FRAG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_TTL_ERRORIngress IPV4 frames with a   punted due to TTL = 1 (TTL of 0 is dropped)
IPV4_TTL_ERROR_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_FRAG_NEEDED_PUNT 
IPV4_FRAG_NEEDED_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_BFDNot implemented by ucode
IPV4_BFD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
RP_PUNTAn ingress IPV4 or MPLS has the   RP punt bit set in the NR-LDI or RX adjacency
RP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IFIBIngress IPV4 ucast or IPV6   frames has an IFIB lookup match resulting in an IFIB punt
PUNT_IFIB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ADJIngress IPV4 ucast or MPLS   frames with the adjacency punt bit set in the NR-LDI or RX adjacency. Egress   IPV4 ucast or MPLS frames with the adjacency punt bit set in the NR-LDI or TX   adjacency.
PUNT_ADJ_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UNKNOWN_IFIBIngress IPV4 ucast frames with   the IFIB bit set in the LEAF or R-LDI and the IFIB lookup does not get a   match, OR ingress MPLS frames with the IFIB bit set in the LEAF or R-LDI
PUNT_UNKNOWN_IFIB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ACL_DENYIngress or Egress frames with a   deny action set in the ACL policy and ACL punt (instead of drop) is enabled
PUNT_ACL_DENY_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ACL_LOGIngress or Egress frames with an   ACL policy match and ACL logging is enabled. Layer3 frames only.
PUNT_ACL_LOG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ACL_LOG_L2Ingress or Egress frames with an   ACL policy match and ACL logging is enabled. Layer2 frames only.
PUNT_ACL_LOG_L2_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_LINK_LOCALIngress IPV6 frames received   that are link local packets - these are punted - layer3 interface only
IPV6_LINK_LOCAL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_HOP_BY_HOPIngress IPV6 frames received   that are hop by hop packets - these are punted - layer3 interface only
IPV6_HOP_BY_HOP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_TTL_ERRORIngress IPV6 frames that have a   TTL error - these are punted - layer3 interface only
IPV6_TTL_ERROR_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_PLU_PUNTIngress or Egress punt of IPV6   frames with punt flag set in Leaf results or R-LDI results - layer3 interface   only
IPV6_PLU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_PLU_RCVNot implemented by ucode
IPV6_PLU_RCV_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_ROUT_HEADIngress IPV6 frames received   that are router header packets - these are punted - layer3 interface only
IPV6_ROUT_HEAD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_TOO_BIGEgress IPV6 frames that are too   bit - exceed MTU - these are punted - layer3 interface only
IPV6_TOO_BIG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_MISS_SRCNot implemented by ucode
IPV6_MISS_SRC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_SRC_LINK_LOCALSource address of ipv6 header is   a link local address (needs punt!)
IPV6_SRC_LINK_LOCAL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6MC_DO_ALLIPV6 Mcast frames punted and not   forwarded. (The punt code is best interpreted as instructions to the LC CPU   receiving the packet.)
IPV6MC_DO_ALL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6MC_DO_ALL_BUT_FWDIPV6 Mcast frames punted and   forwarded. (The punt code is best interpreted as instructions to the LC CPU   receiving the packet.)
IPV6MC_DO_ALL_BUT_FWD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_PLU_PUNTIngress MPLS frames punted due   to Punt set in the Leaf or R-LDI, plus Ingress MPLS router alert frames,   which are punted
MPLS_PLU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_FOR_USIngress MPLS frames punted due   to IFIB (for-us) set in the Leaf or R-LDI
MPLS_FOR_US_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_L2TP_COOKIE_MISMATCHNot implemented by ucode
PUNT_L2TP_COOKIE_MISMATCH_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_L2TP_TUNNEL_DOWNNot implemented by ucode
PUNT_L2TP_TUNNEL_DOWN_EXCDFrames dropped (rather than   punted for the reason above) due to policing
GRE_BAD_FLAGSNot implemented by ucode
GRE_BAD_FLAGS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
GRE_NON_IPV4Not implemented by ucode
GRE_NON_IPV4_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_TUNNEL_NOT_CONFIGDNot implemented by ucode
IPV4_TUNNEL_NOT_CONFIGD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_VCCV_PKTIngress MPLS frames that are PW   VCCV frames - must be PWtoAC de-aggregation flows
PUNT_VCCV_PKT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_QNET_PKTNot implemented by ucode
PUNT_QNET_PKT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_SERVICE_CARDNot implemented by ucode
PUNT_SERVICE_CARD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_STATISTICSStatistics gathering frames   punted to LC host - generated by statistics scanning machine
PUNT_STATISTICS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DIAGS_RSP_ACTNot implemented by ucode
PUNT_DIAGS_RSP_ACT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DIAGS_RSP_STBYNot implemented by ucode
PUNT_DIAGS_RSP_STBY_EXCDFrames dropped (rather than   punted for the reason above) due to policing
NETIO_RP_TO_LC_CPU_PUNTPreroute egress inject frames   received from the RP that are sent to the LC host
NETIO_RP_TO_LC_CPU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MOFRR_PUNTIPV4 multicast-only fast reroute   punts. These are notices to the LC to indicate traffic activity or loss.   NOTE: Subtract MDF_MOFRR_SWITCH_IGNORED from this to find the actual number   of punts, since this counter is incremented prior to the "switch-ignored"   check.
MOFRR_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
VIDMON_PUNTVideo monitoring punt frames
VIDMON_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
VIDMON_PUNT_FLOW_ADDVideo monitoring new flow added   punt frames
VIDMON_PUNT_FLOW_ADD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DBGTRACE_PUNTDebug Trace Packets
DBGTRACE_PUNT_EXCDSee STATS_STATIC_DBGTRACE
SYNCE_PUNTSynchronous ethernet packets   punted
SYNCE_PUNT_EXCDSee STATS_STATIC_PUNT_SYNCE
CFM_CCIngress NP Punt or Egress NP   Punt of CFM CC packets (continuity check). Ingress punts can occur on a   Layer2 or Layer3 interface Egress punts occur on a Layer2 interface only.
CFM_CC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CFM_CCM_RSP_PUNTContinuity Fault Management   Packets punted to RSP
CFM_CCM_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTP_RSP_PUNTSTP packets through normal   bridging
MSTP_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTP_PB_RSP_PUNTSTP packets through bundle   interface, punted to RSP
MSTP_PB_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_PUNTMVRP 1D packets punted
MVRP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_PB_PUNTMVRP 1AD packets punted
MVRP_PB_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_RSP_PUNTMVRP1D packets coming over   bundle and getting punted to RSP
MVRP_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_PB_RSP_PUNTMVRP 1AD packets coming over   bundle and punted to RSP
MVRP_PB_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NETFLOWnetflow packets punted.
PUNT_NETFLOW_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NETFLOW_RESERVEDNot used by ucode but reserved   for netflow
PUNT_NETFLOW_RESERVED_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_FRAG_NEEDED_PUNTMPLS packet for which   fragmentation is required
MPLS_FRAG_NEEDED_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_TTL_ONE_PUNTMPLS packet for which TTL   expired
MPLS_TTL_ONE_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IPV4_ADJ_NULL_RTEIPv4 packets with NULL route   adjacency
PUNT_IPV4_ADJ_NULL_RTE_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IPV6_ADJ_NULL_RTEIPv6 packets with NULL route   adjacency
PUNT_IPV6_ADJ_NULL_RTE_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_L2_IPIW_ARPL2VPN IP Interworking ARP   packets
PUNT_L2_IPIW_ARP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MAC_SECURE_VIOLATIONMAC security violation packets
PUNT_MAC_SECURE_VIOLATION_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MAC_SECURE_VIOLATION_SHUTPackets punted as shutdown MAC   secure violations
PUNT_MAC_SECURE_VIOLATION_SHUT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DAI_VIOLATIONPackets punted for Dynamic Arp   Inspection violation
PUNT_DAI_VIOLATION_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IPSG_VIOLATIONPackets punted for IP Source   Guard violation
PUNT_IPSG_VIOLATION_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_LLDPLink Layer Discovery   Protocol(LLDP) packets punted
PUNT_LLDP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_LLDP_RSPLink Layer Discovery   Protocol(LLDP) packets over bundle punted to RSP
PUNT_LLDP_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ELMIEnhanced Local Management   Interface(ELMI) packets punted
PUNT_ELMI_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PVSTPacket punted for Per Vlan   Spanning Tree Protocol
PUNT_PVST_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ERP_LCEthernet Ring Protection packets   punted to LC
PUNT_ERP_LC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ERP_RSPEthernet Ring Protection packets   punted to RSP
PUNT_ERP_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NETIO_LC_TO_RSPpackets from netio of LC punted   to RSP
PUNT_NETIO_LC_TO_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DBADestination based netflow   packets punted
PUNT_DBA_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_CLUSTER_LINKMONCluster link monitoring packets   punted
PUNT_CLUSTER_LINKMON_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_CLUSTER_DSCCluster Distributed Shelf   Controller packets punted
PUNT_CLUSTER_DSC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_CLUSTER_TESTCluster Test packets punted
PUNT_CLUSTER_TEST_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PTP_ETHERNETPTP ethernet frames punted
PUNT_PTP_ETHERNET_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PTP_IPV4Point-to-point IPv4 packets   punted
PUNT_PTP_IPV4_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PTP_IPV6Point-to-point Ipv6 packets   punted
PUNT_PTP_IPV6_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DIAGS_RX_BUFFDiagnostic Receive Buffer   packets punted
PUNT_DIAGS_RX_BUFF_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPP_RSPOn a bundle subscriber   interface, a PPP Control packet was received on a PPPoE enabled parent   interface and punted to the RSP
PUNT_PPP_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_RSPOn a bundle subscriber   interface, a PPPoE Ctrl packet was received on a PPPoE enabled parent   interface and punted to the RSP
PUNT_PPPOE_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_PACKET_CONFIG_MISMATCHOn a non-bundle subscriber   interface, a PPPoE Control or Data packet was received on a PPPoE parent   interface, met one of the following conditions and was punted to the RSP. 1.   SRC Mac did not match session’s SRC Mac, 2. VLAN ID(s) inner and/or outer did   not match session's VLAN IDs, 3. Session ID was invalid.
PUNT_PPPOE_PACKET_CONFIG_MISMATCH_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_PACKET_CONFIG_MISMATCH_RSPOn a bundle subscriber   interface, a PPPoE Control or Data packet was received on a PPPoE parent   interface, met one of the following conditions and was punted to the RSP. 1.   SRC Mac did not match session’s SRC Mac, 2. VLAN ID(s) inner and/or outer did   not match session's VLAN IDs, 3. Session ID was invalid.
PUNT_PPPOE_PACKET_CONFIG_MISMATCH_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_L2TPV2Layer 2 Tunneling Protocol   Version 2 packets punted
PUNT_PPPOE_L2TPV2_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MAC_CACHE_MSGMAC cache message packets
PUNT_MAC_CACHE_MSG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UDLDUnidirectional link detection   packets punted
PUNT_UDLD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_HTTPRIPV4 HTTP redirect packets   punted
PUNT_HTTPR_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_SDPSatellite Discovery Protocol   packets punted
PUNT_SDP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MIRPMultiple Backbone Instance   Identifier Protocol packets punted
PUNT_MIRP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UNCLASSIFIEDunclassified packets in the   pipeline (should not happen)
PUNT_UNCLASSIFIED_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UNCLASSIFIED_RSPdescription not available yet
PUNT_UNCLASSIFIED_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_HTTPR_IPV6HTTP redirect (BNG) punt for   ipv6
PUNT_HTTPR_IPV6_EXCDFrames dropped (rather than   punted for the reason above) due to policing

 

 

Trident

(some overlap with typhoon)

Display   nameDescription
PARSE_ENET_RECEIVE_CNTTotal frames received from   Ethernet on an ingress NP
PARSE_FABRIC_RECEIVE_CNTTotal frames received by an   egress NP from the fabric -
PARSE_LOOPBACK_RECEIVE_CNTTotal loopback frames received   by an NP -
PARSE_INTERFLEX_RECEIVE_CNTTotal frames received by an NP   from the interflex loopback port - these are ingress loopback frames
PARSE_SVC_LPBK_RECEIVE_CNTdescription not available yet
PARSE_ABF_LPBK_RECEIVE_CNTpackets subject to ABF   recirculated/fed back
PARSE_BVI_RECEIVE_CNTreceived packets on the BVI
MODIFY_FABRIC_TRANSMIT_CNTTotal frames sent to fabric by   an ingress NP
MODIFY_ENET_TRANSMIT_CNTTotal frames sent to Ethernet by   an egress NP
PARSE_INGRESS_DROP_CNTTotal packets dropped by ingress   NP in the TOPparse engine
PARSE_EGRESS_DROP_CNTTotal packets dropped by egress   NP in the TOPparse engine
RESOLVE_INGRESS_DROP_CNTTotal packets dropped by ingress   NP in the TOPresolve engine
RESOLVE_EGRESS_DROP_CNTTotal packets dropped by egress   NP in the TOPresolve engine
RESOLVE_NF_DISABLED_DROP_CNTpackets dropped because netflow   is not enabled
MODIFY_INGRESS_DROP_CNTTotal packets dropped by ingress   NP in the TOPmodify engine
MODIFY_EGRESS_DROP_CNTTotal packets dropped by ingress   NP in the TOPmodify engine
MODIFY_MCAST_FLD_LOOPBACK_CNTTotal packets sent to TM   loopback for Multicast/L2 Flood replications.
MODIFY_SVC_LOOPBACK_CNTPacket recirculated/fed back
PARSE_INGRESS_PUNT_CNTTotal packets flagged for   punting by the ingress NP in the TOPparse engine
PARSE_EGRESS_PUNT_CNTTotal packets flagged for   punting by the egress NP in the TOPparse engine
PARSE_EGRESS_BFD_PUNT_CNTBFD packets that have reached   the egress LC (on which the bfd session is hosted) and which have been remote   punted from a ingress LC
MODIFY_PUNT_DROP_CNTTotal punt packets dropped by   ingress TOPmodify engine due to punt policing, OR due to punt reason lookup   fail.
MODIFY_LC_PUNT_CNTTotal frames punted to LC host   (all punts are handled by the TOPmodify engine)
MODIFY_RP_PUNT_CNTTotal frames punted to RP host   (all punts are handled by the TOPmodify engine)
MODIFY_LC_PUNT_EXCD_CNTPunt frames to LC dropped due to   punt policing
MODIFY_RP_PUNT_EXCD_CNTPunt frames to RP dropped due to   punt policing
MODIFY_RPF_FAIL_DROP_CNTIP multicast frames that failed   reverse-path-forwarding check, but not punted due to NPRF (RPF punt table)   result
VIDMON_PUNT_FAILED_NO_TXBUF_CNTPunt frames dropped by Video   Monitoring due to no buffer
MACN_FAILED_NO_TXBUF_CNTFailed to prefetch buffer to   store mac notify
RMODIFY_NO_BUF_CNTAttempt to allocate a new   buffer, but allocation failed.
MODIFY_RX_SPAN_CNTIngress frames sent to fabric on   a SPAN link - these frames are replicated
MODIFY_TX_SPAN_CNTEgress frames sent to Ethernet   on a SPAN link - these frames are replicated
MODIFY_TX_IFLEX_CNTIFLEX frames processed by   TOPmodify transmit
MODIFY_PW_SPAN_CNTPW SPAN frames processed by   TOPmodify
MODIFY_BFD_TABLE_LOOP_ERRORBFD packets that have been   received through the loopback path and not from the wire.
MODIFY_BFD_TABLE_INDEX_ERRORBFD LPTS discriminator table   index range is invalid for the received BFD multihop packet.
MODIFY_BFD_TABLE_ENTRY_ERRORBFD LPTS discriminator table   entry is invalid for the received BFD multihop packet.
MODIFY_FRAMES_PADDED_CNTTotal number of frames sent to   fabric that were undersized and required padding to 60 bytes.
PARSE_LC_INJECT_TO_FAB_CNTFrames injected from LC host   that are intended to go directly to fabric to an egress LC without   modification or protocol handling (inject header is stripped by microcode)
PARSE_LC_INJECT_TO_PORT_CNTFrames injected from LC host   that are intened to go directly to an Ethernet port without modification or   protocol handling (inject header is stripped by microcode)
PARSE_INJECT_DIAGS_CNTDiag packets inserted injected
PARSE_INJECT_DIAGS_RX_BUFF_CNTreceive diag packets buffered
PARSE_LPBK_DIAGS_RX_BUFF_CNTloopback for buffered diag   packets
PARSE_FAB_INJECT_IPV4_CNTTotal number of IPV4 inject   frames received by the egress NP from the fabric (sent from RP)
PARSE_FAB_INJECT_PRTE_CNTTotal number of layer 3 preroute   inject frames received by the egress NP from the fabric (sent from RP)
PARSE_FAB_INJECT_UNKN_CNTTotal number of unknown inject   frames received by the egress NP from the fabric (sent from RP). These are   punted to the LC host.
PARSE_RP_INJECT_CLUSTER_LC_PUNT_CNTnot applicable to trident since   cluster is not supported on trident.
PARSE_FAB_INJECT_SNOOP_CNTTotal number of IGMP/DHCP snoop   inject frames received by the egress NP from the fabric (sent from RP). For   DHCP, these are always re-injects from the RP. For IGMP, these can be   re-injects or originated injects from the RP.
PARSE_FAB_INJECT_MPLS_CNTTotal number of mpls inject   frames received by the egress NP from the fabric (sent from RP).
PARSE_FAB_INJECT_IPV6_CNTTotal number of IPV6 inject   frames received by the egress NP from the fabric (sent from RP)
PARSE_FAB_INJECT_IPMC_CNTTotal number of IP Multicast   inject frames received by the egress NP from the fabric (sent from RP)
GENERIC_IPV6_UNSUPPORTEDTotal number of packets dropped   due to unsupported feature on the current ucode bundle.
XAUI_TRAINING_PKT_DISCARDDiag packets sent to the egress   NP at startup from the fabric FPGA. These are ignored and dropped by ucode.
PRS_DEBUGTRACE_EVENTEvents that match a   preconfigured debug trace on an ingress or egress frame. Currently the debug   trace is only configurable for all drop events.
PARSE_MOFRR_WATCHDOG_INTR_RCVDL3 Multicast Fast Reroute   Watchdog interrupts received by nP. The count is summation of both Activity   and Loss interrupt counts.
PARSE_MOFRR_SWITCH_MSG_RCVD_FROM_FABL3 Multicast Fast Reroute Switch   (Flood) messages received by nP from Fabric.
PARSE_EGR_MVPN_ENC_PASS1Egress MVPN packets, prior to   replication on this NP
PARSE_EGR_MVPN_ENC_PASS2Egress MVPN packets, after   replication per core tunnel plus one for local receivers, prior to   replication per core mroute or local receiver mroute
PARSE_EGR_MVPN_VRF_COPYmulticast vpn packet copy
PARSE_EGR_MVPN_NO_ENCAP_DROPEgress MVPN packets for which   there are no core tunnels or local receivers on this NP
RESOLVE_INGRESS_L3_PUNT_CNTTotal Layer3 packets flagged for   punting by an ingress NP in the TOPresolve engine due to lookup results or   other cases such as ICMP unreachable
RESOLVE_INGRESS_IFIB_PUNT_CNTTotal Layer3 packets flagged for   punting due to an ingress IFIB lookup match
RESOLVE_INGRESS_L2_PUNT_CNTTotal Layer2 packets flagged for   punting by the egress NP in the TOPresolve engine due to cases such as   IGMP/DHCP snooping or punting of ingress L2 protocol such as LAG or MSTP or   CFM
RESOLVE_EGRESS_L3_PUNT_CNTTotal Layer3 packets flagged for   punting by an ingress NP in the TOPresolve engine due to lookup results or   other cases such as ICMP unreachable
RESOLVE_EGRESS_L2_PUNT_CNTTotal Layer2 packets flagged for   punting by the egress NP in the TOPresolve engine due to cases such as   IGMP/DHCP snooping or punting of ingress L2 protocol such as MSTP or CFM
RESOLVE_INGRESS_LEARN_CNTTotal number of VPLS Source MAC   learns on an ingress frame - learned locals.
RESOLVE_LEARN_FROM_NOTIFY_CNTTotal number of VPLS Source MAC   learns from mac notify received.
RESOLVE_BD_FLUSH_DELETE_CNTTotal number of learned entries   deleted due to a Bridge Domain Flush
RESOLVE_PORT_FLUSH_CNTMAC flush on a port
RESOLVE_PORT_FLUSH_DROP_CNTEgress unicast frames dropped   because the destination port has been flushed. For each a Mac Delete frame is   sent to the bridge domain to remove the destination address.
RESOLVE_PORT_FLUSH_DELETE_CNTLearned MACs deleted due to   their source port being flushed. Does not include MACs deleted due to MAC   Delete message.
RESOLVE_VPLS_SECURE_MAC_DROP_CNTNumber of frames dropped due to   MAC secure
RESOLVE_VPLS_MAC_MOVE_SKIPPED_CNTNumber of MAC-move notifications   skipped due to learn machine congestion
RESOLVE_VPLS_MAC_MOVE_CNTTotal number of source MAC moves   detected as a result of an ingress learn local or mac notify receive learn.
RESOLVE_AGE_NOMAC_DROP_CNTMAC scan aging message dropped   due to an L2FIB lookup fail for the scanned mac entry.
RESOLVE_AGE_MAC_STATIC_DROP_CNTMAC scan aging message dropped   due to static MAC address for the scanned mac entry.
RESOLVE_MOFRR_HASH_UPDATE_CNTMoFRR active flag updates in   MoFRR hash table. This counter indicates the switch message is processed   successfully, i.e. RDT/Hash/Direct table lookups are successful and MoFRR   Active flag is updated in MoFRR hash table.
RESOLVE_VIDMON_FLOWS_DELETED_BY_AGINGInactive Video Monitoring flows   deleted by hardware aging mechanism.
RESOLVE_VIDMON_CLASS_FLOW_LIMIT_REACHEDIndicates that the Video   Monitoring Maximum flows per class limit reached.
RESOLVE_VIDMON_FLOW_START_INTRVL_RESETVideo Monitoring flow start   interval reset to current Real Time Clock Tick (instead of updating with   actual next packet arrival time) because the flow has been inactive for more   than 3 interval timeouts.
RESOLVE_INVALID_VIDMON_PUNT_DROPsanity check for the punt reason
RESOLVE_MOFRR_SWITCH_MSG_INGNOREDTotal numbers of MoFRR switch   (flood) messages are filtered without being punted to LC CPU. This counter   indicates switch message is processed successfully (i.e. lookups successful   and MoFRR flag is updated in hardware hash table), but the message is not   punted to LC CPU either because the RPF Id is not primary or RPF Id is not   local to the nP.
RESOLVE_MOFRR_SWITCH_MSG_TO_FABMoFRR switch (flood) messages   generated by nP as a result of Loss Activity interrupts. This counter   indicates that the Loss Activity interrupt is processed successfully by   ingress LC and MoFRR switch message is flooded to all LCs towards fabric.
RESOLVE_EGR_RPF_FAIL_DROPIP Multicast packets dropped   because they failed Reverse Path Forwarding test: they didn't arrive on the   correct interface/subinterface
RESOLVE_ABF_NON_DEFAULT_RTE 
RESOLVE_EGR_MVPN_DECAPEgress MVPN packets to be   decapsulated for local receivers, for bud-node.
MODIFY_SEND_TO_INTER_RACK_NP_CNTNumber of frames sent to cluster   inter-rack path
IPV4_SANITY_ADDR_CHK_FAILURESIngress IPV4 address martian   check failure
DROP_IPV4_LENGTH_ERRORIngress IPV4 header length   invalid or frame length incompatible with fragment length
DROP_IPV4_HDR_LENGTH_ERRORUnused by ucode
DROP_IPV4_L4HDR_LENGTH_ERRORUnused by ucode
DROP_IPV4_CHECKSUM_ERRORIngress IPV4 checksum invalid
IPV4_EXCEEDS_MTUUnused by ucode
DROP_TCP_FLAGUnused by ucode
IPV6_SANITY_ADDR_CHK_FAILURESIngress IPV6 frame source or   destination address invalid
DROP_IPV6_LENGTH_ERRORIngress IPV6 frame length   invalid
DROP_IPV6_SANITYUnused by ucode
MPLS_TTL_ERRORIngress MPLS frame outer label   TTL is 0
MPLS_INVALID_EXPNULLUnused by ucode
MPLS_EXCEEDS_MTUMPLS TTL exceeded - punt frame   to host
ING_SLOW_PROTO_UNKNOWN_SUBTYPEIngress slow protocol frame on   an L3 interface that is not recognized (not LACP/EFM/SYNCE).
UNKNOWN_L2_ON_L3_DISCARDUnknown Layer2 frame   (non-IPV4/V6/MPLS) on a Layer3 interface. These are dropped. Known layer2   protocols are punted on a layer3 interface such as ARP/LACP/CDP/ISIS/etc.
UNKNOWN_LAYER2Unused by ucode
RESOLVE_L2_PROT_BYTE_ERROR_DROP_CNTInvalid L2 protocol action set -   this is an internal ucode programming error on an ingress or egress L2 frame   if incremented.
RESOLVE_UNUSED_REP_DROPdescription not available yet
ELMI_ADDR_TYPE_ERRORethernet LMI address error
NPH_L2SIZE_SANITY_DROPdescription not available yet
INJ_FEAT_HDR_SANITY_DROPdescription not available yet
UDLD_TAGGED_ERRORsame
RSV_DROP_IFIB_TTL_CHECKpacket dropped in internal fib   due to TTL issue
DROP_IPV4_NOT_ENABLEDIngress IPV4 frame and IPV4 not   enabled in L3 ingress uidb
DROP_IPV4_TTL_ZEROTTL of packet is zero (whoops!)
DROP_IPV4_LINE_STATUSUnused by ucode
BFD_NOT_ENABLEDBFD is not enabled on the   interface on which the BFD packet was receieved
DROP_IPV4_NEXT_HOP_DOWNDrop bit set in rx adjacency   (ingress) or tx adjacency (egress) and ICMP punt disabled in uidb   (ingress/egress) for the interface - drop bit in nr-ldi or adjacency result
IPV4_PLU_DROP_PKTDrop bit set in leaf or nr-ldi   lookup miss (ingress/egress) and ICMP punt disabled in uidb (ingress/egress)   for the interface.
IPV4_RP_DEST_DROPIPV4 RP drop bit set in nr-ldi   or adjacency result and ICMP punt disabled in uidb (ingress/egress) for the   interface
IPV4_NULL_RTE_DROP_PKTNo IPV4 route (ingress/egress)   and ICMP punt disabled in uidb (ingress/egress) for the interface - null   route set in leaf or r-ldi
MCAST_MVPN_IPV4_PIM_ALL_RTRS_DETECTEDIngress MVPN IPv4 packets that   are PIM packets destined to all routers, and therefore forwarded,   decapsulated, and punted
MCAST_MVPN_IPV6_PIM_ALL_RTRS_DETECTEDIngress MVPN IPv6 packets that   are PIM packets destined to all routers, and therefore forwarded,   decapsulated, and punted
MLDP_IPV4_PIM_ALL_RTRS_DETECTEDIngress MLDP IPv4 core packets   that are PIM packets destined to all routers, and therefore forwarded,   decapsulated, and punted
MLDP_IPV6_PIM_ALL_RTRS_DETECTEDIngress MLDP IPv6 core packets   that are PIM packets destined to all routers, and therefore forwarded,   decapsulated, and punted
PARSE_IPV4_PIM_ALL_RTRS_LOOPBK_RXIngress IPv4 core PIM   all-routers packets that were decapsulated and looped back, to be punted.
PARSE_IPV6_PIM_ALL_RTRS_LOOPBK_RXIngress IPv6 core PIM   all-routers packets that were decapsulated and looped back, to be punted.
IPV4_MCAST_MVPN_PIM_ALL_RTRS_NO_IFIB_MATCHIngress IPv4 core PIM   all-routers packets to be punted but not matching any LPTS entries
MCAST_MVPN_EGR_RPF_NON_MLC_DROPEgress RPF-fail packets that   would be punted for signalling, but this is not the master LC/NP
MCAST_MVPN_TUNNEL_MTU_DROPEgress MVPN packets encapsulated   to transmit on core route, but which are dropped due to exceeding core route   MTU
MCAST_MLDP_TUNNEL_MTU_DROPEgress MLDP packets encapsulated   to transmit on core route, but which are dropped due to exceeding core route   MTU
MLDP_LEAF_ING_DROPIngress MLDP packets dropped due   to the ingress drop flag set on the local label; used for Make-Before-Break
MLDP_LEAF_EGR_DROPEgress MLDP packets dropped due   the the egress drop flag set on the local label; used for Make-Before-Break
IPV4_MVPN_ING_DECAP_MVET_NO_MATCHIngress MVPN decap packets   dropped due to not matching any MVPN Encap Table entry (decap and encap share   the same table)
IPV4_MVPN_ING_ENCAP_MVET_NO_MATCHIngress MVPN encap packets   dropped due to not matching any MVPN Encap Table entry
IPV4_MVPN_EGR_ENCAP_MVET_NO_MATCHEgress MVPN encap packets   dropped due to not matching any MVPN Encap Table entry
MLDP_EGR_ENCAP_LABEL_NO_MATCHLookup for the head local label   failed to find a matching entry during MLDP encap 2nd pass
DROP_IPV6_NOT_ENABLEDIngress IPV6 frame and IPV6 not   enabled in L3 ingress uidb
DROP_IPV6_NEXT_HOP_DOWNDrop bit set in rx adjacency   (ingress) or tx adjacency (egress) and ICMP punt disabled in uidb   (ingress/egress) for the interface - drop bit in nr-ldi or adjacency result
PUNT_IPV6_MISS_SRC_COMPUnused by ucode
DROP_IPV6_PLUDrop bit set in leaf or nr-ldi   lookup miss (ingress/egress) and ICMP punt disabled in uidb (ingress/egress)   for the interface.
IPV6_RP_DEST_DROPRP drop bit set in nr-ldi or   adjacency result and ICMP punt disabled in uidb (ingress/egress) for the   interface
IPV6_NULL_RTE_DROP_PKTNo IPV6 route (ingress/egress)   and ICMP punt disabled in uidb (ingress/egress) for the interface - null   route set in leaf or r-ldi
MPLS_NOT_ENABLED_DROPIngress MPLS frame and MPLs not   enabled in L3 ingress uidb
MPLS_PLU_NO_MATCHIngress MPLS frame and outer   label lookup miss and not a VCCV frame associated with a pseudo-wire
MPLS_PLU_DROP_PKTIngress MPLS frame and label   lookup results return a NULL route, or have no forwarding control bits set,   OR one of the following: 1)
MPLS_PLU_ERRORIngress MPLS frame and outer   label lookup miss and not a VCCV frame associated with a pseudo-wire
MPLS_UNSUPP_PLU_LABEL_TYPEIngress MPLS frame outer label   is 15 or less and not a router alert or null tag.
DEAGG_PKT_NON_IPV4Ingress MPLS frame outer label   lookup control bits are L3VPN deagg. And the payload is not IPV4.
XID_ZERO_DISCARDIngress VPWS XC to AC frame has   a zero destination XID stored in the L2 ingress UIDB - zero XID index is   invalid.
UNKNOWN_PREROUTE_PKTUnused by ucode
IPV4_UNICAST_RPF_DROP_PKTWith RPF enabled, an ingress   IPV4 frame has a source IP address that is not permitted, or not permitted on   the ingress interface - these are dropped.
IPV6_UNICAST_RPF_DROP_PKTWith RPF enabled, an ingress   IPV6 frame has a source IP address that is not permitted, or not permitted on   the ingress interface - these are dropped.
IN_UIDB_NO_ENTRYIngress frame with a pre-parse   TCAM index that is invalid - these are dropped. This is likely due to a TCAM   setup problem
IN_UIDB_DOWNIngress frame with a uidb entry   with down status - these are dropped, with the exeception of ingress LACP   frames on a subinterface.
IN_L2_UIDB_DROPIngress Layer2 frames on a   subinterface with the L2 uidb drop bit set.
L3_NOT_MYMACA layer3 unicast IPV4/IPV6 frame   does not have the destination mac address of the router, or any mac address   defined in the VRRP table. These are dropped.
OUT_UIDB_UIDB_DOWNEgress Layer3 frame with an   egress UIDB that has line status down, and ICMP punt is disabled in the uidb.
IPV4_MCAST_NOT_ENABLEDIngress IPV4 frames dropped due   to ipv4 multicast not enabled. The ipv4 multicast enable check may be ignored   for non-routable IGMP frames. Also, the ipv4 multicast enable check does not   apply to well known multicast frames.
IN_FAST_DISCA ingress frame was dropped due   to the early discard feature. This can occur at high ingress traffic rate   based on the configuration.
IN_L2_BLOCKEDIngress L2 frames dropped and   not forwarded due to ingress interface in spanning tree blocked state.
OUT_L2_BLOCKEDEgress L2 frames dropped and not   forwarded due to egress interface in spanning tree blocked state.
IN_DOT1Q_VTP_FILTEREDIngress VTP frames dropped due   to dot1q filtering enabled.
IN_DOT1Q_DROPIngress 802.1q frames dropped   due to dot1q filtering enabled.
IN_DOT1AD_DROPIngress 802.1ad frames dropped   due to dot1ad filtering enabled.
IN_DHCP_UNTRUSTED_DROPIngress DHCP frame dropped due   to the untrusted DHCP bit set in the ingress L2 uidb.
IN_ROUTER_GUARD_DROPIngress Layer2 IGMP or PIM   dropped due to Router Guard with IGMP snooping enabled.
IPV6_MCAST_NOT_ENABLEDIPv6 multicast frames dropped   because IPv6 multicast is not enabled on the interface/subinterface. The   multicast enable check may be ignored for MLD frames. Also, the ipv4   multicast enable check does not apply to packets with link-local destination   addresses.
PARSE_SVC_LPBK_UNKNOWN_PATHdescription not available yet
RESOLVE_ABF_GRE_LPBK_UNKNOWN_PATHdescription not available yet
GRE_ING_ENCAP_P2_PUNT_DROPdescription not available yet
GRE_ING_DECAP_P1_BAD_DATAdescription not available yet
GRE_ING_DECAP_P1_QUAL_NO_MATCHdescription not available yet
GRE_ING_DECAP_P2_CHKSUM_RSV1_NONZEROdescription not available yet
GRE_ING_DECAP_P2_GRE_KEY_PRESENT_DROPdescription not available yet
GRE_ING_DECAP_P2_GRE_SEQ_PRESENT_DROPdescription not available yet
GRE_ING_DECAP_P2_GRE_NONZERO_VER_DROPdescription not available yet
GRE_ING_DECAP_P2_GRE_NONZERO_RSVD0_DROPdescription not available yet
GRE_ING_DECAP_P2_PROT_UNSUPPORTEDdescription not available yet
GRE_ING_DECAP_P2_NESTED_GRE_DROPdescription not available yet
GRE_ING_ENCAP_P2_NESTED_GRE_DROPdescription not available yet
GRE_ING_DECAP_P2_FRAGMENTED_GRE_DROPdescription not available yet
GRE_ING_DECAP_P2_IP_ADD_SANITY_DROPdescription not available yet
GRE_ING_DECAP_P2_NO_UIDB_DROPdescription not available yet
GRE_ING_DECAP_P2_UIDB_DOWNdescription not available yet
GRE_ING_DECAP_P2_KA_PROTO_DOWNdescription not available yet
GRE_ING_DECAP_P2_IP_HDR_SANITY_DROPdescription not available yet
GRE_ING_DECAP_P2_PUNT_DROPdescription not available yet
IPV6_MCAST_NODE_LOCAL_DROPdescription not available yet
CAP_PRS_P1description not available yet
CAP_PRS_P2description not available yet
CAP_RSV_P1_TBdescription not available yet
CAP_RSV_P1_REPdescription not available yet
DBA_PRS_P2description not available yet
DBA_INTR_AGING_DELdescription not available yet
DBA_LEARN_LIMIT_REACHEDdescription not available yet
DBA_LOOKUP_MATCHdescription not available yet
L2VPN_DEAGG_NON_VPWS_VPLS_DROPInvalid setting for L2VPN   deaggregation set in Label UFIB lookup result for ingress MPLS frame. This is   most likely due to a programming error in the Label UFIB entry.
XC2AC_NOMATCH_DROPEgress VPWS XC to AC frame XID   lookup fails. This is caused by an invalid XID index or missing XID entry.
L2UNIC_NOMATCH_DROPEgress VPLS AC to AC frame XID   lookup fails. This is caused by an invalid XID index or missing XID entry.   This can also occur on an IGMP snoop originated inject to an AC/PW/Bundle   with invalid XID in the inject feature header.
L2FLOOD_NOMATCH_DROPEgress VPLS flood copy lookup in   the flood member table fails. This could be caused by an invalid copy number   or missing entry in the flood member table for that copy.
L2FLOOD_SRCDST_DROPEgress VPLS flood copy is   reflection filtered - copies to the original source port are dropped.
L2FLOOD_INACTIVE_MEMBER_DROPEgress VPLS flood copy lookup in   the flood member table returns an entry thats not active (active bit in   result is cleared).
L2FLOOD_EGR_XID_NO_MATCHEgress VPLS flood copy XID   lookup fails - XID stored in the OLIST result is invalid or entry is missing.   This can occur if the copy is intended to go over a PW and the PW is down.
MPLS_EGR_PLU_NO_MATCHMPLS frame outer label lookup on   egress NP does not match - these are dropped.
MPLS_EGR_PLU_DROP_PKTMPLS frame outer label lookup on   egress NP has a result with the drop bit set.
EGR_UNKNOWN_PAK_TYPEA frame received from the fabric   by an egress NP has an unknown NPH header type - these are dropped. This is   likely a ucode implementation error.
EGR_LB_UNKNOWN_PAK_TYPEA frame received from the egress   loopback queue by an egress NP has an unknown NPH header type - these are   dropped. This is likely a ucode implementation error.
EGR_MACN_INVALID_BD_IDNumber of egress MAC notify with   invalid BD id
INJ_NO_XID_MATCH_DROPIngress CFM frame injects with   an XID lookup fail - source XID for bridged injects, and dest. XID for   pre-route injects - invalid XID index or missing entry.
INJ_UNKNOWN_TYPE_DROPUnknown ingress inject received   from the LC host - these are dropped.
EGR_AC_PW_MISMATCHEgress VPWS XC to AC XID lookup   returns a PW type. For VPWS, PW entry is always on ingress.
UNSUPPORTED_INTERRUPT_FRAMEUnsupported interrupt frame type   received on NP. Supported types are for aging and statistics only.
MPLS_VPN_SEC_CHECK_FAILAn ingress MPLS does not have   the proper VPN security code, and IPV4 is not using the global routing table.
EGR_L2MC_OLIST_NOMATCHEgress L2 multicast frame has   olist drop bit set (no copies are sent to output ports), OR egress L2   multicast frame olist lookup fails. Olist lookup failure could be due to a   bad copy number, or a missing entry for that copy.
EGR_L2MC_SRCDSTEgress L2 multicast frame copy   is reflection filtered - copies to the original source port are dropped.
EGR_L2MC_XID_NOMATCHEgress L2 multicast frame copy   XID lookup fails - XID stored in the OLIST result is invalid or entry is   missing. This can occur if the copy is intended to go over a PW and the PW is   down.
EGR_VLANOPS_DROPEgress L2 frame without the   proper number of vlans to do egress VLAN ops - the frame from the fabric   needs at least one vlan to do a pop operation or replace operation.
EGR_PREFILTER_VLAN_DROPEgress L2 frame that fails EFP   pre-filter check - only valid if EFP filtering enabled - attached VLAN   mismatch.
EGR_CFM_PW_DROPEgress CFM frame injected to a   PW - not supported.
ING_QOS_INVALID_FORMATAn ingress packet has a QOS   format value in the ingress uidb that is not valid. Only checked if QOS is   enabled in the ingress uidb. Valid formats are 20/3/2/1/0.
ING_VLAN_FILTER_DISCARDA vlan tagged packet has a uidb   index that does points to a default layer3 uidb - these are dropped. Only   untagged pkts can be setup on a default layer3 uidb.
PARSE_INGRESS_L3_CFM_DROP_CNTIngress CFM frame on a layer 3   interface dropped due to CFM not enabled.
RESOLVE_VPWS_LAG_BIT_DROP_CNTAn ingress VPWS XC to Bundle   frame with a LAG table lookup fail. This is due to programming error where   the LAG table pointer is invalid or no LAG table entry.
RESOLVE_L2_SXID_MISS_DROP_CNTAn ingress VPLS frame with a   source XID lookup fail. This can be due to an invalid source XID programmed   in the L2 ingress uidb, or a missing source XID entry.
RESOLVE_VPLS_SPLIT_HORIZON_DROP_CNTAn ingress or egress VPLS that   is dropped due to a split horizon group mismatch.
RESOLVE_VPLS_REFLECTION_FILTER_DROP_CNTAn ingress unicast VPLS frame   that has a source XID that matches its destination XID. These are dropped   since it cannot be sent back to the source port.
\0[Counter used by ucode   Simulation only]
RESOLVE_VPWS_L2VPN_LDI_MISS_DROP_CNTAn ingress VPWS or VPLS unicast   frame to a PW with an L2VPN LDI table lookup fail. This can be due to an   invalid L2VPN LDI index in the XID, or a missing entry in the L2VPN LDI   table.
RESOLVE_VPWS_RP_DROP_CNTAn ingress VPWS or VPLS unicast   frame to a PW with the RP drop bit or RP dest. bit set in the NR-LDI or   RX-ADJ lookup results. Punts are not supported for an L2 PW adjacency.
RESOLVE_VPWS_NULL_ROUTE_DROP_CNTAn ingress VPWS or VPLS unicast   frame to a PW with the Null Route bit or IFIB punt bit set in the Leaf lookup   or R-LDI lookup results. Punts are not supported for an L2 PW adjacency.
RESOLVE_VPWS_LEAF_DROP_CNTAn ingress VPWS or VPLS unicast   frame to a PW with the Drop bit or Punt bit set in the Leaf lookup or R-LDI   lookup results. Punts are not supported for an L2 PW adjacency.
RESOLVE_VPLS_FLOOD_BLOCK_DROP_CNTAn Ingress VPLS frame that is   dropped due to its associated flood block bit being set: Unknown Unicast or   Multicast.
RESOLVE_L2_ING_ACL_DENY_DROP_CNTTotal number of ingress Layer2   frames dropped due to an ACL deny policy.
RESOLVE_L2_EGR_ACL_DENY_DROP_CNTTotal number of egress Layer2   frames dropped due to an ACL deny policy.
RESOLVE_VPLS_ING_BD_STR_MISS_DROP_CNTAn ingress VPLS frame that is   dropped due to a bridge domain lookup fail.
RESOLVE_VPLS_EGR_BD_STR_MISS_DROP_CNTAn egress VPLS flood frame or   mac notify frame that is dropped due to a BD structure lookup miss.
RESOLVE_L2_EGR_UIDB_MISS_DROP_CNTAn egress VPLS unicast or flood   copy frame to an AC or Bundle that is dropped to an egress L2 UIDB lookup   miss. This is due to an invalid UIDB index in the XID or a missing egress L2   UIDB entry. This can also occur with L2 multicast forwarded frames or L2   multicast inject frames.
RESOLVE_L2_EGR_PW_UIDB_MISS_DROP_CNTAn egress VPLS unicast or flood   copy frame to a PW that is dropped to an egress L2 UIDB lookup miss. This is   due to an invalid UIDB index in the XID or a missing egress L2 UIDB entry.   This can also occur if the PW is down. . This can also occur with L2 multicast   forwarded frames or L2 multicast inject frames to a PW.
RESOLVE_VPLS_ING_ERR_DROP_CNTAn ingress VPLS frame has an   invalid processing type. This is likely an internal error in ucode.
RESOLVE_L2_DHCP_SNOOP_UNTRUSTED_DROP_CNTEgress DHCP frame dropped due to   the untrusted DHCP bit set in the egress L2 uidb.
RESOLVE_VPLS_DAI_VIOLATION_DROP_CNTDynamic ARP inspection caused a   drop
RESOLVE_VPLS_IPSG_VIOLATION_DROP_CNTIP source guard found a   violation and dropped packet
RESOLVE_VPLS_EGR_NULL_RTE_DROP_CNTAn egress VPLS flood frame copy   to a PW with the Null Route bit set in the Leaf lookup or R-LDI lookup   results. Also includes IGMP snoop injects to a PW. Due to a ucode problem,   this may also get incremented due to a BD structure lookup miss on egress flood.
RESOLVE_VPLS_EGR_LEAF_IFIB_DROP_CNTAn egress VPLS flood frame copy   to a PW with the IFIB punt bit set in the Leaf lookup or R-LDI lookup   results. Punts are not supported for an L2 PW adjacency. Also includes IGMP   snoop injects to a PW.
RESOLVE_VPLS_EGR_LEAF_PUNT_DROP_CNTAn egress VPLS flood frame copy   to a PW with the Drop bit or Punt bit or Next Hop Down bit set in the Leaf   lookup or R-LDI or NR-LDI lookup results. Punts are not supported for an L2   PW adjacency. Also includes IGMP snoop injects to a PW.
RESOLVE_VPLS_EGR_TE_LABEL_DROP_CNTAn egress VPLS flood frame copy   to a PW with the Drop bit or Punt bit or Incomplete Adjacency bit set in the   Tx adjacency or Backup Adjacency or NH Adjacency lookup results. Punts are   not supported for an L2 PW adjacency. Also includes IGMP snoop injects to a   PW.
RESOLVE_VPLS_EGR_PW_FLOOD_MTU_DROP_CNTAn egress VPLS flood frame copy   to a PW that fails L3 MTU check. Punts are not supported for an L2 PW   adjacency with MTU fail. Also includes IGMP snoop injects to a PW.
RESOLVE_VPLS_EGR_PW_FLOOD_UIDB_DOWN_DROP_CNTAn egress VPLS flood frame copy   to a PW with egress UIDB in down state. Punts are not supported for an L2 PW   adjacency with line status down. Also includes IGMP snoop injects to a PW.
RESOLVE_VPLS_EGR_STRUCT_MISS_DROP_CNTEgress VPLS frame protocol   handling falls through to an invalid case. This is likely a ucode   implementation error.
RESOLVE_VPLS_EGR_FLD_NO_MEMBERS_DROP_CNTEgress L2 flood frame has zero   members - no copies are sent to output ports.
RESOLVE_VPLS_MCAST_SRC_MAC_DROP_CNTTotal number of ingress frames   with source MACs that were not unicast. These frames are invalid and are are   dropped. Non-unicast source macs cannot be learned.
RESOLVE_VPLS_LEARN_LIMIT_ACTION_DROP_CNTIngress VPLS Frames dropped to   learned limit exceeded - port based or bridge domain based learn limits -   these frames are dropped.
RESOLVE_VPLS_STATIC_MAC_MOVE_DROP_CNTStatic MAC entries that are   deleted due to a MAC move detected - these should never move.
RESOLVE_BAD_EGR_PRS_RSV_MSG_DROP_CNTInvalid TOPparse engine to   TOPresolve engine messages received for ingress frames - this is likely a   ucode implementation error.
RESOLVE_BAD_ING_PRS_RSV_MSG_DROP_CNTInvalid TOPparse engine to   TOPresolve engine messages received for egress frames - this is likely a   ucode implementation error.
RESOLVE_MAC_NOTIFY_CTRL_DROP_CNTTotal number of processed mac   notify frames - forward or reverse mac notify - dropped after processing.
RESOLVE_MAC_DELETE_CTRL_DROP_CNTTotal number of processed mac   delete frames - forward or reverse mac notify - dropped after processing.
RESOLVE_L3_ING_ERROR_DROP_CNTL3 ingress protocol handling in   the TOPresolve engine falls through to an invalid case - these are dropped.   This would occur due to a ucode implementation error.
RESOLVE_L3_EGR_ERROR_DROP_CNTL3 egress protocol handling in   the TOPresolve engine falls through to an invalid case - these are dropped.   This would occur due to a ucode implementation error.
RESOLVE_L3_ING_ACL_DENY_DROP_CNTTotal number of ingress Layer3   frames dropped due to an ACL deny policy.
RESOLVE_L3_EGR_ACL_DENY_DROP_CNTTotal number of egress Layer3   frames dropped due to an ACL deny policy.
RESOLVE_L2L3_QOS_C_DROP_CNTTotal number of ingress/egress   frames dropped to a child policing policy.
RESOLVE_L2L3_QOS_P_DROP_CNTTotal number of ingress/egress   frames dropped to a parent policing policy.
RESOLVE_P2MP_NO_OLIST_DROP_CNTTotal number of egress P2MP/MLDP   packets dropped as there are no output interface on this NP
RESOLVE_P2MP_IP_LOOKUP_FAIL_CNTTotal number of egress P2MP/MLDP   packet that did not get a valid S,G lookup. The packet is not dropped at this   point, we will continue forwarding the core copies, but the decap packets   will not go out.
RESOLVE_P2MP_RPF_FAIL_CNTTotal number of egress P2MP/MLDP   packet that failed the RPF check. The packet is not dropped at this point, we   will continue forwarding the core copies, but the decap packets will not go   out.
RESOLVE_IPMC_NO_OLIST_DROP_CNTIP multicast packets dropped due   no output interface on this NP
RESOLVE_ENCAP_NO_OLIST_DROP_CNTEgress MVPN packets dropped due   no output interface on this NP
RESOLVE_IPMC_RTE_FGID_0_CNTPackets sent to fabric with FGID   of zero, which is the bit bucket. Note that this includes certain punted   frames, and is usually not an error.
RESOLVE_IPMC_FILTER_DROP_CNTIP multicast packets dropped   rather than sent on the interface on which they arrived
RESOLVE_IPMC_ING_DFLAG_DROP_CNTIP multicast packets dropped due   to D flag on route. For example, SSM-range packets for which there is no   matching (S,G) route.
RESOLVE_IPM4_ING_RTE_DROP_CNTIngress IPV4 multicast frames   for which route lookup fails with no match.
RESOLVE_IPM4_EGR_RTE_DROP_CNTEgress IPV4 multicast frames for   which route lookup fails with no match.
RESOLVE_IPM4_OLIST_DROP_CNTEgress IPV4 multicast frames   with olist drop bit set (no copies are sent to output ports), and egress IPV4   multicast frames for which olist lookup fails. Olist lookup failure could be   due to a bad copy number, or a missing entry for that copy.
RESOLVE_IPM4_TTL_DROP_CNTEgress IPv6 multicast copies   that exceed the multicast TTL for its output interface/subinterface
RESOLVE_IPM6_ING_RTE_DROP_CNTIngress IPv6 multicast packets   for which there is no matching mroute
RESOLVE_IPM6_EGR_RTE_DROP_CNTEgress IPv6 multicast packets   for which there is no matching mroute. This should be transient only.
RESOLVE_IPM6_OLIST_DROP_CNTEgress IPv6 multicast packets   with olist drop bit set (no copies are sent to output ports), and egress IPV4   multicast frames for which olist lookup fails. Olist lookup failure could be   due to a bad copy number, or a missing entry for that copy.
RESOLVE_IPM6_TTL_DROP_CNTEgress IPv6 multicast copies   that exceed the multicast TTL for its output interface/subinterface
RESOLVE_VPLS_MAC_FILTER_DROP_CNTAn ingress VPLS frame has a   source or destination MAC with the filter bit set in the L2FIB result - these   are dropped.
RESOLVE_EGR_LAG_NOT_LOCAL_DROP_CNTAn egress frame hash to a bundle   interface has a bundle member that is not local to the NP - these are   dropped. This can be due to a bad hash, or a bad bundle member index. It can   also occur normally for floods or multicast - non-local members are dropped   for each copy that is a bundle output.
RESOLVE_ING_LAG_NO_MATCH_DROP_CNTbundle ethernet issue ingres
RESOLVE_EGR_LAG_NO_MATCH_DROP_CNTbundle ehternet issue egress
RESOLVE_VPLS_MC_ING_RTE_DROP_CNTIngress L2 multicast frame route   lookup fails with no match.
RESOLVE_VPLS_MC_EGR_RTE_DROP_CNTEgress L2 multicast frame route   lookup fails with no match.
RESOLVE_VPLS_MC_NO_OLIST_DROP_CNTEgress L2 multicast frame has   zero olist members - no copies are sent to output ports.
RESOLVE_VPLS_STORM_DROP_CNTAn ingress VPLS frame that is   dropped due to rate exceed for its associated flood storm control - Unknown   Unicast or Multicast or Broadcast.
RESOLVE_EFP_FILTER_TCAM_MISS_DROPEgress L2 frame that fails EFP   filter TCAM - only valid if EFP filtering enabled - likely due to a TCAM   missing entry due to a programming error.
RESOLVE_EFP_FILTER_MISS_MATCH_DROPEgress L2 frame that fails EFP   filter check - only valid if EFP filtering enabled - attached VLAN mismatch.
RESOLVE_MOFRR_HRT_LKUP_FAIL_DROPWatchdog interrupts dropped   because of an error in MoFRR Hash Table lookup. This counter indicates that   the watchdog interrupt (Activity or Loss) is received but micro code failed   to process further because of MoFRR Hash look up failed. This counter indicates   an error.
RESOLVE_MOFRR_WDT_INVALID_RESULTS_DROP_CNTWatchdog interrupts dropped   because of an error in Watch Dog counter hash table lookup. This counter   indicates that the watchdog interrupt (Activity or Loss) is received but   micro code failed to process further because of lookup failed. This counter   indicates an error.
RESOLVE_MOFRR_SWITCH_MSG_HRT_LKUP_FAIL_DROPMoFRR switch messages dropped   because of an error with MoFRR Hash Table lookup failure. This counter   indicates that the switch message is received from fabric but micro code   failed to process further because of MoFRR Hash look up failed. This counter   indicates an error and could be traffic disruptive.
RESOLVE_MOFRR_SWITCH_MSG_SEQNUM_MISMATCH_DROPMoFRR switch messages dropped   because of sequence number mismatch. This counter indicates that the switch   message is received from fabric but micro code failed to process further the   sequence number received from ingress LC does not match with sequence number   for same route on egress LC. This counter indicates a programming error, race   condition or hash result corruption in micro code etc. This is not a usual   thing and could be traffic disruptive.
ABF_LPBK_NON_ROUTABLE_DROP 
RESOLVE_UTURNCHECK_FRR_DROP 
RESOLVE_MVPN_RTE_NOTMASTER_DROP_CNTEgress MVPN packets that would   be punted due to mroute flags, but not punted because this is not the master   LC/NP
L2TP_ING_ENCAP_P2_SID_DROPThere is no entry for the   subscriber in the L2TP session table.
L2TP_ING_DECAP_SIP_DROPThe source IP does not match the   entry in the L2TP session table, the packet is dropped.
L2TP_ING_DECAP_TID_DROPThe tunnel id does not match the   entry in the L2TP session table, the packet is dropped.
L2TP_ING_DECAP_DATA_PKT_DROPThis is a drop of an L2TP data   packet, that was going to be punted. Usually this follows an   L2TP_LOOKUP_MISS.
L2TP_ING_DECAP_VER_DROPIncorrect L2TP version, the   packet is dropped.
UIDB_TCAM_MISS_AGG_DROPAggregate count for packets   dropped because the TCAM could not match the vlan (combo) to a (sub)   interface
UIDB_TCAM_MISS_PORT0_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT1_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT2_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT3_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT4_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT5_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT6_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT7_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT8_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT9_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
CFM_ING_PUNTIngress CFM frames punted
PARSE_HOST_INJ_BFD_IPV4_L3_INWARDTransmitted BFD Multihop packet   counters that are injected into the NP from host on which the bfd_session is   hosted.
L2_INJECT_ING_PARSE_INWARDTotal number of ingress CFM   injects received from the LC host that are intended to be sent to the fabric.   These can either be bridged or pre-routed to a specific NP.
L2_ING_PARSE_BRIDGEDdescription not available yet
L2_INJECT_ING_PARSE_PREROUTETotal number of ingress CFM   injects received from the LC host that are intended to be pre-routed to a   specific output port on an egress NP. bridged and sent to the fabric. The   bridge lookups are not done for these inject frames.
L2_INJECT_PARSE_EGRESSl2 injected packets in the   egress direction
INJECT_EGR_PARSE_PRRT_NEXT_HOPInject preroute frames received   from the fabric that are next hop type.
INJECT_EGR_PARSE_PRRT_PITInject preroute frames received   from the fabric that are PIT type .
L3_EGR_RSV_PRRT_PUNT_TO_LC_CPUInject preroute frames that have   a PIT table lookup miss. These are punted to the LC host.
CFM_EGR_PARSETotal egress Layer2 CFM frames   processed by the NP - including egress CFM inject and egress CFM forwarded   frames.
CFM_EGR_PUNTEgress CFM frames punted
ING_DHCP_PW_UNTRUSTED_DROPDHCP packet ingressing on PW   dropped due to untrusted interface check.
EGR_DHCP_PW_UNTRUSTED_DROPDHCP packet egressing on PW   dropped due to untrusted interface check.
PARSE_FAB_MACN_RECEIVE_CNTFrames received from fabric on   egress LC with NPH mac notify flood type (mac notify for ingress SA learn).
PARSE_FAB_DEST_MACN_RECEIVE_CNTMAC notify frames received from   fabric on egress LC that are reverse MAC notify type
PARSE_FAB_MAC_DELETE_RECEIVE_CNTMAC notify frames received from   fabric on egress LC that are mac delete type
PARSE_FAB_DEST_MAC_DELETE_RECEIVE_CNTNumber of MAC Delete responses   received
PARSE_FAB_MACN_DOT1ah_RECEIVE_CNTNumber of MAC Notify received   for 802.1ah traffic
PARSE_FAB_DEST_MACN_DOT1ah_RECEIVE_CNTNumber of MAC Notify response   received for 802.1ah traffic
PARSE_PORTFLUSH_CNTNumber of port flushes detected
PARSE_INTR_AGE_CNTNumber of aging interrupt frames   received
PARSE_INTR_STATS_CNTNumber of interrupt frames   received by TOPparse
PARSE_VIDMON_FLOW_AGING_SCAN_CNTTotal number of Parse Interrupt   frames associated with video monitoring flow scanning.
RESOLVE_INGRESS_SMAC_MISS_CNTTotal number of ingress frames   with source MACs that did have a learned entry. These source MACs will be   relearned if learned limits have not been exceeded, learning is enabled, and   the address is unicast.
RESOLVE_HALF_AGE_RELEARN_CNTTotal mac address from ingress   frames that were relearned due to exceeding the half age period. These   entries are refreshed to update the age timeout.
RESOLVE_HALF_AGE_RELEARN_SKIPPED_CNT 
RESOLVE_PORT_FLUSH_AGE_OUT_CNTVPLS MAC entries that have been   port flushed as detected by the MAC aging scan. These frames are dropped.   Also can occur if the frame XID lookup fails and the XID is global or learned   local - XID has been removed.
PARSE_ING_DOT1ah_ISID_DROP_CNTDiscard non-compliant ISID   frames; UCA bit and RES2 field must be zero
RESOLVE_ING_DOT1ah_LOOP_DROP_CNTDiscard non-compliant ISID   frames; UCA bit and RES2 field must be zero
RESOLVE_ING_DOT1ah_NO_CUST_BD_DROP_CNTDot1ah core to edge and ISID   match and customer BD lookup miss
RESOLVE_ING_DOT1ah_NO_ISID_DROP_CNTDot1ah core to edge and ISID   miss and provider DA is my-bmac, or edge to core and ISID miss
RESOLVE_ING_DOT1ah_PROV_DA_DROP_CNTDot1ah edge to core and provider   DA is my-bmac
RESOLVE_ING_DOT1ah_CUST_DA_DROP_CNTDot1ah core to edge and customer   DA is rmt-cmac
PARSE_ING_IP_INTWRK_IP_PUNT_CNTIP interworking MAC mapping is   not ready; punt to host
PARSE_ING_IP_INTWRK_NOT_IP_DROP_CNTIP interworking drop non-ip   frames
RESOLVE_EG_IP_INTWRK_PKT_CNTIP interworking egress frame   count
RESOLVE_ING_IP_INTWRK_PKT_CNTIP interworking ingress frame   count
INGRESS_L2TP_LOOKUP_MISSThe session lookup failed on the   ingress core facing linecard. The entry is not programmed in hardware. The   packet will be dropped (if IP-for-me) or routed.
PARSE_INGRESS_L2TP_VRF_NOMATCHThe vrf in the uidb does not   match the vrf in the L2TP session table.
PARSE_INGRESS_L2TP_IP_NOMATCHThe destination IP does not   match the entry in the L2TP session table, so this is not a “to me” packet.   The packet is forwarded normally.
PARSE_L2_INJ_TS_L2_IN_CNTCFM DMM/DMR inject side   timestamp ingress frame count
PARSE_L2_INJ_TS_L2_EGR_CNTCFM DMM/DMR inject side   timestamp egress frame count
PARSE_L2_INJ_TS_NP_PORT_CNTCFM DMM/DMR timestamp frame   inject to port count
RESOLVE_L2_INJ_TS_CNTCFM DMM/DMR inject side   timestamp frame count
RESOLVE_L2_PUNT_TS_CNTCFM DMM/DMR punt side timestamp   frame count
STATS_RESOLVE_MAC_ACC_SA_MISSMac Accounting frame SMAC no   match
STATS_RESOLVE_MAC_ACC_DA_MISSMac Accounting frame DMAC no   match
PUNT_INVALIDInvalid Punt Reason - this   should not occur
PUNT_INVALID_DROPInvalid Punt Reason - this   should not occur
PUNT_ALLPunt All Set - not implemented   by ucode
PUNT_ALL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CDPPunt Ingress CDP protocol frames   - layer3 interface only
CDP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
ARPPunt Ingress ARP protocol frames   - layer3 interface only
ARP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
RARPPunt Ingress Reverse ARP   protocol frames - layer3 interface only
RARP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CGMPPunt Ingress CGMP protocol   frames - layer3 interface only
CGMP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
LOOPPunt Ingress ELOOP protocol   frames - layer3 interface only
LOOP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
SAP_PUNTNot implemented by ucode
SAP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
BUNDLE_PROTO_PUNTNot implemented by ucode
BUNDLE_PROTO_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
UNKNOWN_OSINot implemented by ucode
UNKNOWN_OSI_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DIAGSNot implemented by ucode
DIAGS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
SNIFFNot implemented by ucode
SNIFF_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_GLOBAL_IFHANDLE_TCAM_MISS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DROP_PACKETNot implemented by ucode
DROP_PACKET_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CFM_OTHERIngress NP Punt or Egress NP   Punt of CFM other packets (link trace or perf. mon.). Ingress punts can occur   on a Layer2 or Layer3 interface Egress punts occur on a Layer2 interface   only.
CFM_OTHER_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CFM_OTHER_RSP_PUNTconnecitivty fault management   punts
CFM_OTHER_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DHCP_SNOOP_REQIngress Punt of DHCP snoop   request frames - layer2 interface only and DHCP snooping enabled
DHCP_SNOOP_REQ_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DHCP_SNOOP_REPLYIngress Punt of DHCP snoop reply   frames - layer2 interface only and DHCP snooping enabled
DHCP_SNOOP_REPLY_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTPIngress NP Punt or Egress NP   Punt of MSTP frames. For Layer2 VPLS or Layer3, punt is on ingress frames   only. For Layer3 VPWS, punt is on egress frames only.
MSTP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTP_PBIngress NP Punt or Egress NP   Punt of MSTP Provider Bridge frames. For Layer2 VPLS or Layer3, punt is on   ingress frames only. For Layer3 VPWS, punt is on egress frames only.
MSTP_PB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DAINot implemented by ucode
DAI_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IGMP_SNOOPIngress punt of snooped IGMP or   PIM frames - layer2 interface only and IGMP snooping enabled
IGMP_SNOOP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPSUBNot implemented by ucode
IPSUB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PPPOENot implemented by ucode
PPPOE_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PPPNot implemented by ucode
PPP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
EFMIngress Punt of EFM Protocol   frames - layer3 interface only
EFM_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPv4_OPTIONSIngress Punt of IP frames with   options - layer3 interface only - IPV4, IPV6
IPv4_OPTIONS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_PLU_PUNTIngress or Egress punt of IPV4   frames with punt flag set in Leaf results or R-LDI results - layer3 interface   only
IPV4_PLU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4MC_DO_ALLIngress punt of IPV4 Mcast   frames due to punt only set for route, OR Egress punt of IPV4 Mcast frames   due to punt and forward bit set for mcast group member - layer3 interface   only. IPV4 Mcast punts not support for egress route.
IPV4MC_DO_ALL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4MC_DO_ALL_BUT_FWDIPV4 Mcast frames punted and not   not forwarded. (The punt code is best interpreted as instructions to the LC   CPU receiving the packet.)
IPV4MC_DO_ALL_BUT_FWD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_DOUBLE_TUNNELIPV4 Mcast frames punted and   forwarded. (The punt code is best interpreted as instructions to the LC CPU   receiving the packet.)
IPV4_DOUBLE_TUNNEL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NO_MATCHIngress or Egress IPV4 IPV6   unicast frames punted due to ICMP Unreachable (i.e., next hop down)
PUNT_NO_MATCH_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_TUNNEL_FORUSNot implemented by ucode
IPV4_TUNNEL_FORUS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_FRAG_TUNNELNot implemented by ucode
IPV4_FRAG_TUNNEL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_CANNOT_FRAGNot implemented by ucode
IPV4_CANNOT_FRAG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_TTL_ERRORIngress IPV4 frames with a   punted due to TTL = 1 (TTL of 0 is dropped)
IPV4_TTL_ERROR_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_FRAG_NEEDED_PUNTpackets punted because they   exceed interface mtu and need fragmentation which is not done in HW   forwarding path
IPV4_FRAG_NEEDED_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_BFDNot implemented by ucode
IPV4_BFD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
RP_PUNTAn ingress IPV4 or MPLS has the   RP punt bit set in the NR-LDI or RX adjacency
RP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IFIBIngress IPV4 ucast or IPV6   frames has an IFIB lookup match resulting in an IFIB punt
PUNT_IFIB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ADJIngress IPV4 ucast or MPLS   frames with the adjacency punt bit set in the NR-LDI or RX adjacency. Egress   IPV4 ucast or MPLS frames with the adjacency punt bit set in the NR-LDI or TX   adjacency.
PUNT_ADJ_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UNKNOWN_IFIBIngress IPV4 ucast frames with   the IFIB bit set in the LEAF or R-LDI and the IFIB lookup does not get a   match, OR ingress MPLS frames with the IFIB bit set in the LEAF or R-LDI
PUNT_UNKNOWN_IFIB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ACL_DENYIngress or Egress frames with a   deny action set in the ACL policy and ACL punt (instead of drop) is enabled
PUNT_ACL_DENY_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ACL_LOGIngress or Egress frames with an   ACL policy match and ACL logging is enabled. Layer3 frames only.
PUNT_ACL_LOG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ACL_LOG_L2Ingress or Egress frames with an   ACL policy match and ACL logging is enabled. Layer2 frames only.
PUNT_ACL_LOG_L2_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_LINK_LOCALIngress IPV6 frames received   that are link local packets - these are punted - layer3 interface only
IPV6_LINK_LOCAL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_HOP_BY_HOPIngress IPV6 frames received   that are hop by hop packets - these are punted - layer3 interface only
IPV6_HOP_BY_HOP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_TTL_ERRORIngress IPV6 frames that have a   TTL error - these are punted - layer3 interface only
IPV6_TTL_ERROR_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_PLU_PUNTIngress or Egress punt of IPV6   frames with punt flag set in Leaf results or R-LDI results - layer3 interface   only
IPV6_PLU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_PLU_RCVNot implemented by ucode
IPV6_PLU_RCV_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_ROUT_HEADIngress IPV6 frames received   that are router header packets - these are punted - layer3 interface only
IPV6_ROUT_HEAD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_TOO_BIGEgress IPV6 frames that are too   bit - exceed MTU - these are punted - layer3 interface only
IPV6_TOO_BIG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_MISS_SRCNot implemented by ucode
IPV6_MISS_SRC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_SRC_LINK_LOCALipv6 link local address needs   punt
IPV6_SRC_LINK_LOCAL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6MC_DO_ALLIPV6 Mcast frames punted and not   forwarded. (The punt code is best interpreted as instructions to the LC CPU   receiving the packet.)
IPV6MC_DO_ALL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6MC_DO_ALL_BUT_FWDIPV6 Mcast frames punted and   forwarded. (The punt code is best interpreted as instructions to the LC CPU   receiving the packet.)
IPV6MC_DO_ALL_BUT_FWD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_PLU_PUNTIngress MPLS frames punted due   to Punt set in the Leaf or R-LDI, plus Ingress MPLS router alert frames,   which are punted
MPLS_PLU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_FOR_USIngress MPLS frames punted due   to IFIB (for-us) set in the Leaf or R-LDI
MPLS_FOR_US_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_L2TP_COOKIE_MISMATCHNot implemented by ucode
PUNT_L2TP_COOKIE_MISMATCH_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_L2TP_TUNNEL_DOWNNot implemented by ucode
PUNT_L2TP_TUNNEL_DOWN_EXCDFrames dropped (rather than   punted for the reason above) due to policing
GRE_BAD_FLAGSNot implemented by ucode
GRE_BAD_FLAGS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
GRE_NON_IPV4Not implemented by ucode
GRE_NON_IPV4_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_TUNNEL_NOT_CONFIGDNot implemented by ucode
IPV4_TUNNEL_NOT_CONFIGD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_VCCV_PKTIngress MPLS frames that are PW   VCCV frames - must be PWtoAC de-aggregation flows
PUNT_VCCV_PKT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_QNET_PKTNot implemented by ucode
PUNT_QNET_PKT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_SERVICE_CARDNot implemented by ucode
PUNT_SERVICE_CARD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_STATISTICSStatistics gathering frames   punted to LC host - generated by statistics scanning machine
PUNT_STATISTICS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DIAGS_RSP_ACTNot implemented by ucode
PUNT_DIAGS_RSP_ACT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DIAGS_RSP_STBYNot implemented by ucode
PUNT_DIAGS_RSP_STBY_EXCDFrames dropped (rather than   punted for the reason above) due to policing
NETIO_RP_TO_LC_CPU_PUNTPreroute egress inject frames   received from the RP that are sent to the LC host
NETIO_RP_TO_LC_CPU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MOFRR_PUNTIPV4 multicast over fast reroute   punt frames
MOFRR_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
VIDMON_PUNTVideo monitoring punt frames
VIDMON_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
VIDMON_PUNT_FLOW_ADDVideo monitoring new flow added   punt frames
VIDMON_PUNT_FLOW_ADD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DBGTRACE_PUNTDebug Trace Packets
DBGTRACE_PUNT_EXCDSee STATS_STATIC_DBGTRACE
SYNCE_PUNTSynchronous ethernet packets   punted
SYNCE_PUNT_EXCDSee STATS_STATIC_PUNT_SYNCE
CFM_CCIngress NP Punt or Egress NP   Punt of CFM CC packets (continuity check). Ingress punts can occur on a   Layer2 or Layer3 interface Egress punts occur on a Layer2 interface only.
CFM_CC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CFM_CCM_RSP_PUNTContinuity Fault Management   Packets punted to RSP
CFM_CCM_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTP_RSP_PUNTSTP packets through normal   bridging
MSTP_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTP_PB_RSP_PUNTSTP packets through bundle   interface, punted to RSP
MSTP_PB_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_PUNTMVRP 1D packets punted
MVRP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_PB_PUNTMVRP 1AD packets punted
MVRP_PB_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_RSP_PUNTMVRP1D packets coming over   bundle and getting punted to RSP
MVRP_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_PB_RSP_PUNTMVRP 1AD packets coming over   bundle and punted to RSP
MVRP_PB_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NETFLOWnetflow packets punted.
PUNT_NETFLOW_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NETFLOW_RESERVEDNot used by ucode but reserved   for netflow
PUNT_NETFLOW_RESERVED_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_FRAG_NEEDED_PUNTMPLS packet for which   fragmentation is required
MPLS_FRAG_NEEDED_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_TTL_ONE_PUNTMPLS packet for which TTL   expired
MPLS_TTL_ONE_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IPV4_ADJ_NULL_RTEIPv4 packets with NULL route   adjacency
PUNT_IPV4_ADJ_NULL_RTE_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IPV6_ADJ_NULL_RTEIPv6 packets with NULL route   adjacency
PUNT_IPV6_ADJ_NULL_RTE_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_L2_IPIW_ARPL2VPN IP Interworking ARP   packets
PUNT_L2_IPIW_ARP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MAC_SECURE_VIOLATIONMAC security violation packets
PUNT_MAC_SECURE_VIOLATION_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MAC_SECURE_VIOLATION_SHUTPackets punted as shutdown MAC   secure violations
PUNT_MAC_SECURE_VIOLATION_SHUT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DAI_VIOLATIONPackets punted for Dynamic Arp   Inspection violation
PUNT_DAI_VIOLATION_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IPSG_VIOLATIONPackets punted for IP Source   Guard violation
PUNT_IPSG_VIOLATION_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_LLDPLink Layer Discovery   Protocol(LLDP) packets punted
PUNT_LLDP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_LLDP_RSPLink Layer Discovery   Protocol(LLDP) packets over bundle punted to RSP
PUNT_LLDP_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ELMIEnhanced Local Management   Interface(ELMI) packets punted
PUNT_ELMI_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PVSTPacket punted for Per Vlan   Spanning Tree Protocol
PUNT_PVST_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ERP_LCEthernet Ring Protection packets   punted to LC
PUNT_ERP_LC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ERP_RSPEthernet Ring Protection packets   punted to RSP
PUNT_ERP_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NETIO_LC_TO_RSPpackets from netio of LC punted   to RSP
PUNT_NETIO_LC_TO_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DBADestination based netflow   packets punted
PUNT_DBA_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_CLUSTER_LINKMONCluster link monitoring packets   punted
PUNT_CLUSTER_LINKMON_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_CLUSTER_DSCCluster Distributed Shelf   Controller packets punted
PUNT_CLUSTER_DSC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_CLUSTER_TESTCluster Test packets punted
PUNT_CLUSTER_TEST_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PTP_ETHERNETPTP ethernet frames punted
PUNT_PTP_ETHERNET_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PTP_IPV4Point-to-point IPv4 packets   punted
PUNT_PTP_IPV4_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PTP_IPV6Point-to-point Ipv6 packets   punted
PUNT_PTP_IPV6_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DIAGS_RX_BUFFDiagnostic Receive Buffer   packets punted
PUNT_DIAGS_RX_BUFF_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPP_RSPOn a bundle subscriber   interface, a PPP Control packet was received on a PPPoE enabled parent   interface and punted to the RSP
PUNT_PPP_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_RSPOn a bundle subscriber   interface, a PPPoE Ctrl packet was received on a PPPoE enabled parent   interface and punted to the RSP
PUNT_PPPOE_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_PACKET_CONFIG_MISMATCHOn a non-bundle subscriber   interface, a PPPoE Control or Data packet was received on a PPPoE parent   interface, met one of the following conditions and was punted to the RSP. 1.   SRC Mac did not match sessionÂ’s SRC Mac, 2. VLAN ID(s) inner and/or outer did   not match session's VLAN IDs, 3. Session ID was invalid.
PUNT_PPPOE_PACKET_CONFIG_MISMATCH_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_PACKET_CONFIG_MISMATCH_RSPOn a bundle subscriber   interface, a PPPoE Control or Data packet was received on a PPPoE parent   interface, met one of the following conditions and was punted to the RSP. 1.   SRC Mac did not match sessionÂ’s SRC Mac, 2. VLAN ID(s) inner and/or outer   did not match session's VLAN IDs, 3. Session ID was invalid.
PUNT_PPPOE_PACKET_CONFIG_MISMATCH_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_L2TPV2Layer 2 Tunneling Protocol   Version 2 packets punted
PUNT_PPPOE_L2TPV2_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MAC_CACHE_MSGMAC cache message packets
PUNT_MAC_CACHE_MSG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UDLDUnidirectional link detection   packets punted
PUNT_UDLD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_HTTPRIPV4 HTTP redirect packets   punted
PUNT_HTTPR_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_SDPSatellite Discovery Protocol   packets punted
PUNT_SDP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MIRPMultiple Backbone Instance   Identifier Protocol packets punted
PUNT_MIRP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UNCLASSIFIEDunclassified packets
PUNT_UNCLASSIFIED_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UNCLASSIFIED_RSPunclassified packets
PUNT_UNCLASSIFIED_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_HTTPR_IPV6ipv6 http redirect (bng   fnctionality)
PUNT_HTTPR_IPV6_EXCDFrames dropped (rather than   punted for the reason above) due to policing

 

 

 

 

 

 

 

Xander Thuijs - CCIE #6775

Sr Tech Lead ASR9000

Average Rating: 0 (0 ratings)

Actions

Login or Register to take actions

This Document

Posted August 20, 2012 at 7:43 AM
Stats:
Comments:0 Avg. Rating:0
Views:6040 Contributors:0
Shares:1
Tags: No tags.